user1342 / Obfu-DE-ScateLinks
Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even if they have been renamed as part of obfuscation. It compares two versions of an APK and generates a mapping text file and an interactive HTML file as outputs!
☆183Updated last year
Alternatives and similar repositories for Obfu-DE-Scate
Users that are interested in Obfu-DE-Scate are comparing it to the libraries listed below
Sorting:
- A modular and extendable Python tool for emulating simple SMALI code.☆92Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆570Updated last month
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆157Updated last year
- A list of bizarre crackmes☆132Updated 2 weeks ago
- Frida hook generator for Ghidra☆124Updated 3 months ago
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- Dynamic injection tool for Linux/Android☆191Updated 11 months ago
- Slides & Hands-on for the reverse engineering workshop☆184Updated 3 years ago
- Statically unpacking common android banker malware.☆159Updated 8 months ago
- Slides and videos from my public speeches / conferences☆78Updated last week
- 🏄♂️ Decode and analyze protobuf efficiently.☆134Updated last year
- ☆94Updated 3 years ago
- Type diagram plugin for JADX decompiler☆72Updated 2 weeks ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated 2 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆22Updated 2 years ago
- A place to reborn☆60Updated 3 years ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆116Updated 2 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆270Updated 2 years ago
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆370Updated last month
- Inspect and instrument React Native applications at runtime☆95Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆101Updated last year
- Notes for my video on running an ARM64 Android emulator in Azure☆38Updated last year
- A burp for intents wannabe☆76Updated last year
- Smali reference for reverse engineering Dalvik Bytecode☆37Updated 2 years ago
- Miscellaneous code☆109Updated 5 months ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆357Updated 2 years ago
- ☆64Updated last year
- Binary Ninja plugin to analyze and simplify obfuscated code☆229Updated 2 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆59Updated 2 years ago
- Dalvik bytecode disassembler and graph view☆67Updated last year