user1342 / Obfu-DE-ScateLinks
Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even if they have been renamed as part of obfuscation. It compares two versions of an APK and generates a mapping text file and an interactive HTML file as outputs!
☆179Updated last year
Alternatives and similar repositories for Obfu-DE-Scate
Users that are interested in Obfu-DE-Scate are comparing it to the libraries listed below
Sorting:
- A modular and extendable Python tool for emulating simple SMALI code.☆89Updated last year
- Frida hook generator for Ghidra☆126Updated 3 months ago
- A list of bizarre crackmes☆122Updated 2 months ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆562Updated 2 months ago
- Slides & Hands-on for the reverse engineering workshop☆183Updated 2 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆144Updated last year
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆105Updated 2 years ago
- Slides and videos from my public speeches / conferences☆76Updated 3 months ago
- Statically unpacking common android banker malware.☆155Updated 4 months ago
- A place to reborn☆60Updated 2 years ago
- Type diagram plugin for JADX decompiler☆65Updated this week
- ☆90Updated 3 years ago
- ☆61Updated last year
- Dynamic injection tool for Linux/Android☆168Updated 8 months ago
- A burp for intents wannabe☆71Updated last year
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated last year
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆365Updated 2 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆126Updated 10 months ago
- Inspect and instrument React Native applications at runtime☆72Updated 9 months ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆354Updated 2 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆99Updated last year
- Notes for my video on running an ARM64 Android emulator in Azure☆37Updated last year
- Run the Medusa Android framework inside a docker container on x86 or ARM☆36Updated 2 years ago
- Miscellaneous code☆110Updated last month
- Binary Ninja plugin to analyze and simplify obfuscated code☆163Updated last month
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.☆76Updated last year
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆631Updated 5 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆263Updated 2 years ago
- Dalvik bytecode disassembler and graph view☆67Updated last year