yoavst / JebOpsLinks
Plugins for reversing android apps in JEB
☆75Updated 9 months ago
Alternatives and similar repositories for JebOps
Users that are interested in JebOps are comparing it to the libraries listed below
Sorting:
- Files used to resolve the r2pay challenge☆52Updated 4 years ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆59Updated 5 years ago
- ART tracing research☆91Updated 2 years ago
- ☆59Updated last year
- Update Frida hooks automatically.☆27Updated last year
- blabla☆50Updated 4 years ago
- ☆51Updated last year
- typescript autocomplete plugin for frida's java warpper☆38Updated last year
- Instructions tracing powered by frida☆178Updated 6 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago
- Small Apps As PoC to Detect Frida With Frida☆53Updated 3 years ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆140Updated 6 months ago
- Frida module to hook module initializations on android☆67Updated 4 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆118Updated 3 years ago
- My own collection of Frida scripts and tricks☆69Updated 4 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆352Updated 2 years ago
- A dynamic dex dumper, implemented in rust, no frida.☆140Updated 2 years ago
- Obfuscated Binaries☆29Updated 2 years ago
- you can use frida in jeb !☆46Updated 2 years ago
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆97Updated 3 years ago
- DroidGuard VM Samples☆58Updated 3 years ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆70Updated 2 years ago
- Generic Frida Script To Bypass Root Detection☆56Updated 2 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆180Updated last year
- monitor svc calls of android☆73Updated 6 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆61Updated 2 years ago
- Bypass dynamic linking function restriction on Android by forging caller address☆40Updated 3 years ago
- a simple tool for easyily dev/debug using frida and write module for agent. (mainly used for android)☆81Updated 3 weeks ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆92Updated last year
- jni.h compiled for Ghidra☆85Updated 5 years ago