user1342 / Obfu-DE-Scate
Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even if they have been renamed as part of obfuscation. It compares two versions of an APK and generates a mapping text file and an interactive HTML file as outputs!
☆161Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for Obfu-DE-Scate
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆136Updated 10 months ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆460Updated 3 months ago
- Some Of Anti-Frida Stuff☆107Updated 2 years ago
- Can you change the server ?☆84Updated last week
- Slides & Hands-on for the reverse engineering workshop☆178Updated last year
- Frida hook generator for Ghidra☆104Updated 4 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆83Updated 6 months ago
- ☆87Updated 2 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆107Updated last month
- Slides and videos from my public speeches / conferences☆70Updated last week
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆231Updated last year
- A burp for intents wannabe☆44Updated 3 months ago
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.☆60Updated 6 months ago
- Smali reference for reverse engineering Dalvik Bytecode☆30Updated last year
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆327Updated last year
- A guide to choosing between different Android Emulator options for Reverse Engineers☆83Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆81Updated 9 months ago
- Code Coverage Exploration Plugin for Ghidra☆331Updated 3 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆230Updated this week
- ☆83Updated 3 months ago
- jni.h compiled for Ghidra☆68Updated 4 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆22Updated last year
- Collection of useful FRIDA Mobile Scripts☆116Updated last year
- The ARTful library for dynamically modifying the Android Runtime☆308Updated 7 months ago
- This contains notes and slides for my Objective by the Sea talk☆93Updated last year
- Analyze Golang with Ghidra☆121Updated this week
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆196Updated last year
- The goal of this project is to help researchers to analyze traffic encapsulated in SSL or TLS.☆272Updated last week
- Miscellaneous code☆97Updated last month