yjlcoder / Android-file-access-monitor
Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.
☆10Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for Android-file-access-monitor
- Dynamic injection tool for Linux/Android☆68Updated 2 months ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆13Updated 7 months ago
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆61Updated 8 months ago
- Deploy your own AOSPXRef☆20Updated 9 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆84Updated 6 months ago
- Deobfuscate "paranoid" protected apps☆44Updated 10 months ago
- Code injection on Android without ptrace☆199Updated 7 months ago
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆30Updated 5 months ago
- Using Apktool and Frida to do reverse engineering on Android Apk.☆57Updated 5 years ago
- You can bypass various Android security system checks such as Signature Verification, Integrity Check, etc. with this repo.☆57Updated 2 years ago
- Python API Monitor for Android apps☆51Updated 4 months ago
- ☆74Updated 3 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆138Updated 11 months ago
- DroidGuard VM Samples☆45Updated 2 years ago
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆73Updated 2 years ago
- An android project implementing magisk, frida and debugger detection using native library☆20Updated 9 months ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆19Updated 3 months ago
- This demo project is the code a tutorial on how to hacking an Android games using Frida☆15Updated 2 years ago
- An offline documentation browser for Smali☆14Updated 4 years ago
- frida runtime resolves smali☆68Updated 2 weeks ago
- Some Of Anti-Frida Stuff☆107Updated 2 years ago
- 记录下学习Android AOSP源码的过程。☆12Updated 3 weeks ago
- POC Tool to detect if app is ran on an emulator☆69Updated last week
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆231Updated last year
- Loadable Kernel Module for Android☆68Updated 4 years ago
- Getting better stacks and backtraces in Frida☆32Updated 4 months ago
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆51Updated 6 months ago
- Use LD-Preload to Inject a shared library on any android version and architecture☆50Updated last year
- Android system call hook☆118Updated last month