testwhat / SmaliExLinks
A wrapper to get de-optimized dex from odex/oat/vdex.
☆543Updated last month
Alternatives and similar repositories for SmaliEx
Users that are interested in SmaliEx are comparing it to the libraries listed below
Sorting:
- Tool to decompile & extract Android Dex bytecode from Vdex files☆1,067Updated 10 months ago
- Android dynamic instrumentation framework☆768Updated 6 years ago
- Library for hooking on ART☆484Updated 7 years ago
- General Automatic Unpacking Tool for Android Dex Files☆1,337Updated 8 years ago
- A plugin for IntelliJ IDEA & Android Studio to easily compile Java & Kotlin files to smali.☆499Updated 4 years ago
- ShakaApktool☆854Updated 7 years ago
- Yet Another Hook Framework for ART☆1,614Updated 10 months ago
- Android ART with modifications for the Xposed framework.☆386Updated 4 years ago
- Library for parsing and printing compiled Android manifest files☆245Updated 4 months ago
- Android application hooking tool based on VirtualApp☆767Updated 5 years ago
- AndroidManifest Binary Editor☆121Updated 8 years ago
- Unofficial port of setools to Android with additional sepolicy-inject utility included☆259Updated 7 years ago
- This tool is used to extract dex files from oat file.☆168Updated 8 years ago
- These tools can be used to compile and package the Xposed framework.☆486Updated 4 years ago
- ☆491Updated 10 years ago
- An Xposed and adbi based module which is capable of hooking both Java and Native methods targeting Android OS.☆477Updated 8 years ago
- ddi - Dynamic Dalvik Instrumentation Toolkit☆395Updated 10 years ago
- A syntax highlighter for the Dalvik bytecode language, Smali☆176Updated 3 years ago
- ☆357Updated 5 years ago
- ☆238Updated 4 years ago
- android art hook like Sophix☆283Updated 7 years ago
- A generic DEX file obfuscator and munger☆265Updated 9 years ago
- Android app dynamic reverse tool based on Xposed framework.☆1,015Updated 10 years ago
- ☆546Updated 8 years ago
- The second generation Android Hardening Protection☆398Updated 6 years ago
- It's very similiar to Substrate. But I give you three methods to do HOOK.☆211Updated 9 years ago
- ☆253Updated 3 years ago
- Example of obfuscating an Android NDK project using O-LLVM☆217Updated 10 years ago
- AndroidManifest ARSC文件二进制修改工具☆489Updated 2 years ago
- Android Dalvik bytecode patcher.☆433Updated 5 years ago