yhs0602 / Android-DisassemblerLinks
Disassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as pictures, audios, etc(for fun)files on Android. Capstone-based disassembler application on android. 안드로이드 NDK 공유 라이브러리, Windows 바이너리, etc,... 리버싱 앱
☆666Updated 5 months ago
Alternatives and similar repositories for Android-Disassembler
Users that are interested in Android-Disassembler are comparing it to the libraries listed below
Sorting:
- Deobfuscator for Android Application☆452Updated 3 years ago
- Android Dalvik bytecode patcher.☆436Updated 5 years ago
- Recreate Java code from Smali☆527Updated 2 years ago
- Bypass APK Signatures Verify & Integrity Check using Reflection☆397Updated last year
- Convert an APK to an Android Studio Project using multiple open-source decompilers☆381Updated 2 years ago
- APKRepatcher - Modify your apk code with easy GUI☆192Updated 6 years ago
- Stand-alone binary AndroidManifest.xml decoder☆234Updated 4 years ago
- Detect Frida for Android☆776Updated 4 years ago
- Android VM injection and BinderJacking sample code, and some ramblings about root☆244Updated 6 years ago
- Install Magisk on Official Android Emulator☆742Updated last year
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆401Updated 2 years ago
- smalidea is a smali language plugin for IntelliJ IDEA☆684Updated 2 years ago
- Automated tool for patching APKs to enable the use of Frida gadget by downloading the library and injecting code into the main activity.☆320Updated 2 weeks ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,108Updated 2 years ago
- Dump Memory of Process in Android☆311Updated 4 years ago
- ☆320Updated 6 months ago
- A couple of methods for detecting Frida on Android.☆481Updated 3 years ago
- Magisk Module that allows you to run "adb root". Android 10 only. Probably will work with Android 9. Definitely not with Android 11/12.☆478Updated last year
- A way to detect magisk hide using an Android feature☆215Updated 3 years ago
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,212Updated 3 weeks ago
- Anti-Debug and Anti-Memory Dump for Android☆276Updated 4 years ago
- An automatic obfuscation tool for Android apps that works in a black-box fashion, supports advanced obfuscation features and has a modula…☆1,202Updated last year
- Modding Unity app with Frida tutorial.☆243Updated 4 years ago
- Public researchings of the Google's Android apps protection☆309Updated 2 months ago
- A large collection of github repositories related to android modding.☆640Updated 2 years ago
- Android binary resources read/write library☆322Updated 2 weeks ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,317Updated 2 weeks ago
- Analysis scripts for Ghidra to work with Android NDK libraries.☆348Updated 2 years ago
- memory search and patch tool on debuggable apk without root & ndk☆400Updated 6 months ago
- This script automates the task of patching an apk with frida-gadget☆159Updated 2 months ago