user1342 / Obfu-DE-ScateLinks
Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even if they have been renamed as part of obfuscation. It compares two versions of an APK and generates a mapping text file and an interactive HTML file as outputs!
☆186Updated last year
Alternatives and similar repositories for Obfu-DE-Scate
Users that are interested in Obfu-DE-Scate are comparing it to the libraries listed below
Sorting:
- A modular and extendable Python tool for emulating simple SMALI code.☆92Updated last year
- Some Of Anti-Frida Stuff☆127Updated 3 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆159Updated 2 years ago
- Frida hook generator for Ghidra☆126Updated 4 months ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆573Updated last month
- A list of bizarre crackmes☆135Updated last month
- Slides & Hands-on for the reverse engineering workshop☆184Updated 3 years ago
- Dynamic injection tool for Linux/Android☆194Updated last year
- Statically unpacking common android banker malware.☆160Updated 9 months ago
- Slides and videos from my public speeches / conferences☆78Updated last month
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆370Updated last month
- Type diagram plugin for JADX decompiler☆73Updated 2 weeks ago
- ☆94Updated 3 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆273Updated 2 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Updated last year
- A guide to choosing between different Android Emulator options for Reverse Engineers☆118Updated 2 years ago
- A burp for intents wannabe☆78Updated last year
- Inspect and instrument React Native applications at runtime☆98Updated last year
- This contains notes and code for my Troopers23 Beyond Java talk☆22Updated 2 years ago
- ☆62Updated last year
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated 2 years ago
- Smali reference for reverse engineering Dalvik Bytecode☆38Updated 2 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆358Updated 2 years ago
- Notes for my video on running an ARM64 Android emulator in Azure☆38Updated last year
- A place to reborn☆60Updated 3 years ago
- Contains all the scripts and sample apps related to android in app protections.☆38Updated last month
- 🏄♂️ Decode and analyze protobuf efficiently.☆135Updated last year
- Miscellaneous code☆109Updated 5 months ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆232Updated 2 months ago
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.☆77Updated last year