user1342 / Obfu-DE-ScateLinks
Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even if they have been renamed as part of obfuscation. It compares two versions of an APK and generates a mapping text file and an interactive HTML file as outputs!
☆183Updated last year
Alternatives and similar repositories for Obfu-DE-Scate
Users that are interested in Obfu-DE-Scate are comparing it to the libraries listed below
Sorting:
- A modular and extendable Python tool for emulating simple SMALI code.☆91Updated last year
- Frida hook generator for Ghidra☆124Updated 2 months ago
- A list of bizarre crackmes☆126Updated 5 months ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆568Updated 2 weeks ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆150Updated last year
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- Dynamic injection tool for Linux/Android☆191Updated 10 months ago
- Statically unpacking common android banker malware.☆158Updated 7 months ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆116Updated 2 years ago
- Slides and videos from my public speeches / conferences☆78Updated this week
- Slides & Hands-on for the reverse engineering workshop☆184Updated 2 years ago
- ☆94Updated 3 years ago
- Smali reference for reverse engineering Dalvik Bytecode☆36Updated 2 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆266Updated 2 years ago
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆368Updated last week
- Type diagram plugin for JADX decompiler☆70Updated 3 weeks ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆100Updated last year
- 🏄 ♂️ Decode and analyze protobuf efficiently.☆134Updated last year
- Inspect and instrument React Native applications at runtime☆92Updated last year
- A place to reborn☆59Updated 3 years ago
- A burp for intents wannabe☆75Updated last year
- Miscellaneous code☆109Updated 4 months ago
- This contains notes and code for my Troopers23 Beyond Java talk☆22Updated 2 years ago
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.☆77Updated last year
- ☆63Updated last year
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated 2 years ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆37Updated 2 years ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆226Updated last month
- The ARTful library for dynamically modifying the Android Runtime☆339Updated last year
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆355Updated 2 years ago