user1342 / Obfu-DE-ScateLinks
Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even if they have been renamed as part of obfuscation. It compares two versions of an APK and generates a mapping text file and an interactive HTML file as outputs!
☆176Updated last year
Alternatives and similar repositories for Obfu-DE-Scate
Users that are interested in Obfu-DE-Scate are comparing it to the libraries listed below
Sorting:
- A list of bizarre crackmes☆118Updated last month
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆144Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆553Updated last month
- Slides & Hands-on for the reverse engineering workshop☆180Updated 2 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆88Updated last year
- Slides and videos from my public speeches / conferences☆75Updated last month
- Frida hook generator for Ghidra☆121Updated last month
- Some Of Anti-Frida Stuff☆124Updated 3 years ago
- Type diagram plugin for JADX decompiler☆64Updated 5 months ago
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆359Updated 2 years ago
- Statically unpacking common android banker malware.☆153Updated 3 months ago
- A burp for intents wannabe☆69Updated 11 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆258Updated 2 years ago
- Dynamic injection tool for Linux/Android☆162Updated 6 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆96Updated last year
- A guide to choosing between different Android Emulator options for Reverse Engineers☆103Updated 2 years ago
- ☆90Updated 3 years ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆629Updated 4 months ago
- Smali reference for reverse engineering Dalvik Bytecode☆38Updated last year
- 🏄♂️ Decode and analyze protobuf efficiently.☆124Updated 9 months ago
- A place to reborn☆60Updated 2 years ago
- Miscellaneous code☆109Updated 2 weeks ago
- Dalvik bytecode disassembler and graph view☆67Updated last year
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.☆75Updated last year
- The ARTful library for dynamically modifying the Android Runtime☆339Updated last year
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated last year
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆352Updated last year
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆65Updated last year
- ☆69Updated 2 weeks ago
- A Collection of Android (Samsung) Security Research References☆422Updated this week