yhs0602 / Android-DisassemblerLinks
Disassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as pictures, audios, etc(for fun)files on Android. Capstone-based disassembler application on android. 안드로이드 NDK 공유 라이브러리, Windows 바이너리, etc,... 리버싱 앱
☆643Updated last month
Alternatives and similar repositories for Android-Disassembler
Users that are interested in Android-Disassembler are comparing it to the libraries listed below
Sorting:
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,097Updated 2 years ago
- Deobfuscator for Android Application☆437Updated 2 years ago
- Android Dalvik bytecode patcher.☆433Updated 5 years ago
- Recreate Java code from Smali☆525Updated 2 years ago
- Bypass APK Signatures Verify & Integrity Check using Reflection☆365Updated 9 months ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,227Updated 3 weeks ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,723Updated last year
- Detect Frida for Android☆749Updated 3 years ago
- Android binary resources read/write library☆283Updated last week
- Android VM injection and BinderJacking sample code, and some ramblings about root☆236Updated 6 years ago
- A couple of methods for detecting Frida on Android.☆472Updated 3 years ago
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆402Updated last year
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆498Updated 6 years ago
- Automated tool for patching APKs to enable the use of Frida gadget by downloading the library and injecting code into the main activity.☆263Updated 2 weeks ago
- memory search and patch tool on debuggable apk without root & ndk☆390Updated 2 months ago
- smalidea is a smali language plugin for IntelliJ IDEA☆678Updated 2 years ago
- APK/DEX detector for Windows, Linux and MacOS.☆649Updated this week
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,117Updated last week
- Dump Memory of Process in Android☆296Updated 4 years ago
- A way to detect magisk hide using an Android feature☆213Updated 3 years ago
- A complete solution for apps using root permissions☆1,888Updated 11 months ago
- Anti-Debug and Anti-Memory Dump for Android☆272Updated 4 years ago
- Script to quickly hook natives call to JNI in Android☆570Updated last year
- Android virtual machine and deobfuscator☆4,545Updated 3 years ago
- Tool to decompile & extract Android Dex bytecode from Vdex files☆1,067Updated 10 months ago
- Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0☆1,144Updated 5 years ago
- Lightweight ARMv8-A(ARM64, AArch64, Little-Endian) Inline Hook Library for Android C/C++☆678Updated 2 years ago
- Stand-alone binary AndroidManifest.xml decoder☆224Updated 4 years ago
- Inject frida agents on local processes through an Android app☆267Updated 4 years ago
- Frida CLI tools☆393Updated this week