yjlcoder / Android-file-access-monitorLinks
Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.
☆11Updated last year
Alternatives and similar repositories for Android-file-access-monitor
Users that are interested in Android-file-access-monitor are comparing it to the libraries listed below
Sorting:
- You can bypass various Android security system checks such as Signature Verification, Integrity Check, etc. with this repo.☆62Updated 2 years ago
- An Android Injector aimed to inject through Virtual Space without root permissions☆150Updated 5 months ago
- Easy-to-use Android library for tampering detection, with a sample app included☆55Updated 3 months ago
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆28Updated 6 months ago
- LSPosed module to prevent Santander UK app from detecting Zygisk implementations☆26Updated 3 weeks ago
- A library for hiding and retrieving imports in ELF binaries.☆176Updated 2 months ago
- An offline documentation browser for Smali☆16Updated 5 years ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆58Updated 4 years ago
- Magisk Module to enable engineering build props☆28Updated 5 years ago
- Toolset which makes possible hiddenly inject code in Android apps through system libraries☆47Updated last month
- Small POC code that detects known root-related apps by attempting to launch their activities and monitoring security exception.☆22Updated 3 months ago
- Simple frida anti-detection patch☆38Updated 3 months ago
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.☆139Updated 3 months ago
- https://github.com/frida/frida-python with devkit☆24Updated 3 weeks ago
- CVE-2025-0087 EoP full PoC☆17Updated 3 months ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆39Updated 10 months ago
- Remap a library to avoid detection☆123Updated last year
- PoC of using android:name attribute for hooking☆22Updated 7 months ago
- ☆45Updated 3 years ago
- Android 14 Beta 1 framework/services source code, reverse engineered from a Pixel 7 Pro (upb1.230309.014)☆16Updated 2 years ago
- Obfuscated Binaries☆29Updated 2 years ago
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆26Updated last month
- simple dex string deobfuscator☆13Updated 5 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆53Updated last week
- Simple example of jadx plugin☆21Updated 3 months ago
- Deploy your own AOSPXRef☆24Updated 5 months ago
- Pine Hook +☆33Updated this week
- This tool is purposely used for APKKiller☆19Updated 3 years ago
- Pine and Frida better together☆15Updated 7 months ago
- This demo project is the code a tutorial on how to hacking an Android games using Frida☆18Updated 3 years ago