steelcode / art-hook-vtable-gsoc15
ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.
☆79Updated 9 years ago
Alternatives and similar repositories for art-hook-vtable-gsoc15:
Users that are interested in art-hook-vtable-gsoc15 are comparing it to the libraries listed below
- Extended oatdump from AOSP platform/art repo☆135Updated 7 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆118Updated 10 years ago
- inotifywait for Android☆102Updated 9 years ago
- ☆23Updated 7 years ago
- AndroidSubstrate_hookingC_examples☆56Updated 9 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆129Updated 9 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆86Updated 9 years ago
- A SDK for the creation of analysis tools without obtaining app source code in order to profile runtime performance, examine code coverage…☆199Updated 6 years ago
- Dalvik vm Instrumentation OS☆87Updated 8 years ago
- Android OAT Plugin for JEB☆46Updated last year
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago
- PoC code for 32 bit Android OS☆133Updated 9 years ago
- AduitDroid☆120Updated 8 years ago
- restart adbd with root privileges☆163Updated 8 years ago
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 11 years ago
- Various Jeb plugins, including obfuscation restore☆93Updated 8 years ago
- This tool is used to extract dex files from oat file.☆168Updated 7 years ago
- Android Unpack tool based on Cydia☆93Updated 7 years ago
- ☆104Updated 3 years ago
- POC of packing app(only dalvik supported)--Decrypt code on the fly☆49Updated 9 years ago
- Dex manipulation library☆102Updated 9 years ago
- A very rudimentary Android DEX file parser☆67Updated 10 years ago
- Make any application debuggable☆131Updated 11 years ago
- Example of obfuscating an Android NDK project using O-LLVM☆217Updated 10 years ago
- It's very similiar to Substrate. But I give you three methods to do HOOK.☆212Updated 9 years ago
- Dalvik Monitoring Framework for CuckooDroid☆91Updated 8 years ago
- Dalvik字节码自篡改原理及实现☆48Updated 7 years ago
- a poc of Android bug 17356824☆55Updated 10 years ago
- walk into Android security step by step☆101Updated 6 years ago