user1342 / Obfu-DE-Scate
Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even if they have been renamed as part of obfuscation. It compares two versions of an APK and generates a mapping text file and an interactive HTML file as outputs!
☆168Updated last year
Alternatives and similar repositories for Obfu-DE-Scate:
Users that are interested in Obfu-DE-Scate are comparing it to the libraries listed below
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆143Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆531Updated last week
- A list of bizarre crackmes☆110Updated last month
- Frida hook generator for Ghidra☆117Updated 3 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆88Updated last year
- Some Of Anti-Frida Stuff☆121Updated 2 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆343Updated last year
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆355Updated 2 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆117Updated 6 months ago
- Slides and videos from my public speeches / conferences☆74Updated 2 weeks ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆244Updated last year
- A burp for intents wannabe☆69Updated 8 months ago
- Slides & Hands-on for the reverse engineering workshop☆178Updated 2 years ago
- Dynamic injection tool for Linux/Android☆112Updated 4 months ago
- Smali reference for reverse engineering Dalvik Bytecode☆35Updated last year
- ☆49Updated last week
- Type diagram plugin for JADX decompiler☆59Updated 2 months ago
- ☆90Updated 3 years ago
- A place to reborn☆59Updated 2 years ago
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.☆72Updated last year
- Collection of useful FRIDA Mobile Scripts☆152Updated 3 weeks ago
- Miscellaneous code☆105Updated 3 weeks ago
- Code Coverage Exploration Plugin for Ghidra☆348Updated 9 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆89Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆251Updated 5 months ago
- Android 14 kernel exploit for Pixel7/8 Pro☆493Updated last year
- The ARTful library for dynamically modifying the Android Runtime☆329Updated last year
- My own collection of Frida scripts and tricks☆69Updated 3 years ago
- jni.h compiled for Ghidra☆80Updated 5 years ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆98Updated 2 years ago