vaioco / ARTDroid
☆23Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for ARTDroid
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- AndroidSubstrate_hookingC_examples☆55Updated 9 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆84Updated 9 years ago
- Extended oatdump from AOSP platform/art repo☆134Updated 7 years ago
- The Android Runtime Instrumentation Toolkit☆23Updated 8 years ago
- OAT AXML ARSC Template for 010Editor☆74Updated 7 years ago
- The demo source of injection_by_ptrace☆61Updated 10 years ago
- Parser and Modify AndroidManifest.xml to prevent APK from re-packege☆113Updated 10 years ago
- Android Unpack tool based on Cydia☆93Updated 6 years ago
- Android OAT Plugin for JEB☆46Updated last year
- POC of packing app(only dalvik supported)--Decrypt code on the fly☆47Updated 9 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆117Updated 9 years ago
- inotifywait for Android☆100Updated 9 years ago
- Dalvik字节码自篡改原理及实现☆47Updated 7 years ago
- ☆31Updated 8 years ago
- Android Injector☆23Updated 7 years ago
- Parse and tamper DEX file☆17Updated 7 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆40Updated 6 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆58Updated 8 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆33Updated 9 years ago
- Various Jeb plugins, including obfuscation restore☆92Updated 8 years ago
- android arm64(aarch64) code inject☆38Updated 9 years ago
- ☆104Updated 3 years ago
- A simple example for tampering bytecode☆22Updated 10 years ago
- GOT Hook implemented in Android☆74Updated 7 years ago
- Extracting .dex files from Android ART .oat/.odex files☆31Updated 9 years ago