yjlcoder / Android-file-access-monitorLinks
Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.
β11Updated last year
Alternatives and similar repositories for Android-file-access-monitor
Users that are interested in Android-file-access-monitor are comparing it to the libraries listed below
Sorting:
- π± RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems suβ¦β14Updated last year
- Easy-to-use Android library for tampering detection, with a sample app includedβ58Updated 5 months ago
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.β27Updated 3 months ago
- Deploy your own AOSPXRefβ26Updated 7 months ago
- A modular and extendable Python tool for emulating simple SMALI code.β89Updated last year
- This demo project is the code a tutorial on how to hacking an Android games using Fridaβ20Updated 3 years ago
- Dynamic injection tool for Linux/Androidβ168Updated 8 months ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for seβ¦β45Updated last year
- Some Of Anti-Frida Stuffβ128Updated 3 years ago
- App for learnfrida.infoβ21Updated 3 years ago
- xVision is a plugin for the JadX decompiler that aims to integrate with Large Language Models (LLMs) to provide code analysis directly inβ¦β61Updated 3 months ago
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.β142Updated 5 months ago
- An offline documentation browser for Smaliβ16Updated 5 years ago
- https://github.com/frida/frida-python with devkitβ28Updated last month
- Android reverse-engineering tool / smali editorβ123Updated last week
- Toolset which makes possible hiddenly inject code in Android apps through system librariesβ57Updated last month
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.β76Updated last year
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes anβ¦β10Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.β144Updated last year
- β90Updated 3 years ago
- POC Tool to detect if app is ran on an emulatorβ139Updated 7 months ago
- Getting better stacks and backtraces in Fridaβ51Updated 2 weeks ago
- a lightweight, multi-platform, multi-architecture hook framework.β15Updated 8 months ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64β53Updated this week
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loaβ¦β65Updated last year
- β61Updated last year
- Code injection on Android without ptraceβ252Updated last year
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel β¦β322Updated 2 years ago
- Portable frida injector for rooted android devices.β205Updated 2 years ago
- CVE-2025-0087 EoP full PoCβ20Updated 5 months ago