sterrasec / apk-meditLinks
memory search and patch tool on debuggable apk without root & ndk
☆413Updated 10 months ago
Alternatives and similar repositories for apk-medit
Users that are interested in apk-medit are comparing it to the libraries listed below
Sorting:
- a useful utility for android app security testing☆92Updated 8 months ago
- Anti-Debug and Anti-Memory Dump for Android☆281Updated 4 years ago
- Defeat Java packers via Frida instrumentation☆212Updated last month
- A couple of methods for detecting Frida on Android.☆492Updated 3 years ago
- Deobfuscator for Android Application☆469Updated 3 years ago
- Script to quickly hook natives call to JNI in Android☆620Updated 2 years ago
- Frida Android utilities☆263Updated 2 years ago
- Inject frida agents on local processes through an Android app☆272Updated 4 years ago
- Modding Unity app with Frida tutorial.☆246Updated 5 years ago
- PoC to bypass Android restrictions☆217Updated 6 years ago
- Examples of using frida to hook android apps☆177Updated 3 years ago
- A tool that helps you work with frida easily for Android platform☆618Updated last year
- Detect Frida for Android☆794Updated 4 years ago
- The second generation Android Hardening Protection☆407Updated 7 years ago
- Analysis scripts for Ghidra to work with Android NDK libraries.☆358Updated 3 years ago
- Lets you hook Method Calls in Frida ( Android )☆394Updated 6 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆658Updated 11 months ago
- Is a protect Android App anti any attacks and environments.☆355Updated 2 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,121Updated 2 years ago
- This script automates the task of patching an apk with frida-gadget☆167Updated 6 months ago
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆409Updated 2 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆210Updated 2 years ago
- Engine used by jnitrace to intercept JNI API calls.☆330Updated 2 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆358Updated 2 years ago
- Collection of useful FRIDA Mobile Scripts☆420Updated 4 years ago
- Java runtime interop from Frida☆395Updated last week
- Dart / Flutter VM snapshot analyzer☆339Updated 4 years ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆337Updated 2 years ago
- Runs frida-server on boot as root with magisk.☆217Updated 2 years ago
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆733Updated 4 months ago