user1342 / Obfu-DE-ScateLinks
Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even if they have been renamed as part of obfuscation. It compares two versions of an APK and generates a mapping text file and an interactive HTML file as outputs!
☆180Updated last year
Alternatives and similar repositories for Obfu-DE-Scate
Users that are interested in Obfu-DE-Scate are comparing it to the libraries listed below
Sorting:
- Frida hook generator for Ghidra☆124Updated last month
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆566Updated 3 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆90Updated last year
- A list of bizarre crackmes☆122Updated 4 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆147Updated last year
- Slides & Hands-on for the reverse engineering workshop☆183Updated 2 years ago
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆131Updated last year
- Dynamic injection tool for Linux/Android☆178Updated 9 months ago
- Statically unpacking common android banker malware.☆155Updated 6 months ago
- Slides and videos from my public speeches / conferences☆76Updated 4 months ago
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆366Updated last month
- ☆93Updated 3 years ago
- Type diagram plugin for JADX decompiler☆67Updated last month
- A guide to choosing between different Android Emulator options for Reverse Engineers☆110Updated 2 years ago
- A place to reborn☆59Updated 2 years ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆631Updated 6 months ago
- Inspect and instrument React Native applications at runtime☆84Updated 10 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆265Updated 2 years ago
- A burp for intents wannabe☆71Updated last year
- This contains notes and code for my Troopers23 Beyond Java talk☆22Updated 2 years ago
- Smali reference for reverse engineering Dalvik Bytecode☆36Updated 2 years ago
- The ARTful library for dynamically modifying the Android Runtime☆339Updated last year
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.☆76Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆100Updated last year
- ☆62Updated last year
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆354Updated 2 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆206Updated last year
- Miscellaneous code☆109Updated 3 months ago
- This repository explain how to write frida hook scripts and analysis written hooks.☆86Updated 2 years ago