shchuchynshchyna / antiabuse-request
Making protobuf request to Android anti-abuse service
☆25Updated 6 years ago
Alternatives and similar repositories for antiabuse-request:
Users that are interested in antiabuse-request are comparing it to the libraries listed below
- Android sample project using DroidGuard native library☆10Updated 6 years ago
- SafetyNet Jar download & extractor utility☆37Updated 7 years ago
- ☆37Updated 7 years ago
- It automates the Injection of frida gadgets on android application to run frida Server on non rooted Device☆53Updated 3 years ago
- Scope VM: Javascript Virtual Machine☆32Updated 6 years ago
- DroidGuard VM Samples☆50Updated 2 years ago
- An implementation of some of the Google Play's API calls. Includes a tool to download apps.☆74Updated 2 years ago
- Frida module to hook module initializations on android☆67Updated 4 years ago
- Script to inject frida gadget into APK☆33Updated 4 years ago
- ☆21Updated 5 years ago
- InHouse safetynet killer☆30Updated 5 years ago
- ☆30Updated 7 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 2 years ago
- Update Frida hooks automatically.☆27Updated last year
- Plugins for reversing android apps in JEB☆69Updated 6 months ago
- Hooks libboringssl.dylib to extract TLS keys and enables the traffic from iOS apps to be decrypted.☆53Updated 2 years ago
- Deobfuscation of akamai DRM, they use JSScrambler☆18Updated last year
- http://forum.xda-developers.com/xposed/modules/mod-advanced-logging-t3472533☆24Updated 5 years ago
- Android application tracer powered by Frida☆78Updated 5 years ago
- This demo project is the code a tutorial on how to hacking an Android games using Frida☆18Updated 2 years ago
- Frida hooks and helpers mostly aimed at finding crypto functions.☆39Updated 2 years ago
- Exploit code for CVE-2021-1961☆111Updated 2 years ago
- ☆17Updated 10 months ago
- Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode)☆45Updated 3 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- Files used to resolve the r2pay challenge☆50Updated 4 years ago
- All the mono c exports, ready to be used in frida!☆74Updated 4 years ago
- A small script to get syscall info from its number (intented to be used with Frida)☆21Updated 3 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆88Updated 7 years ago
- Create an outbound stream over a message transport.☆19Updated last year