ysh329 / android-reverse-engineeringLinks
android-reverse-engineering
☆26Updated 6 years ago
Alternatives and similar repositories for android-reverse-engineering
Users that are interested in android-reverse-engineering are comparing it to the libraries listed below
Sorting:
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Updated 5 years ago
- Automated Frida hook generation with JEB☆152Updated 2 years ago
- PoC to bypass Android restrictions☆217Updated 6 years ago
- Android rootkit☆44Updated 9 years ago
- A small utilities to scan process memory and search patterns using frida with a single line of command☆22Updated 4 years ago
- Java-layer Android Malware Simplifier☆27Updated 4 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆141Updated 10 years ago
- Deckard performs static and dynamic binary analysis on Android APKs to extract Xposed hooks☆81Updated 3 years ago
- ARTist's deployment application, for code-injection on an Android device.☆39Updated 6 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆210Updated 2 years ago
- Tamper detection in Android☆92Updated 4 years ago
- ☆29Updated 7 years ago
- This is a dex lib that is origin from AOSP 9.0 for parsing dexfile witch c/c++☆27Updated 5 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Updated 3 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆93Updated last year
- A linux / android / MacOS hooking framework☆118Updated 3 years ago
- Intercept android apps based on unity3d (Mono) using Frida☆49Updated 6 years ago
- A place to reborn☆60Updated 3 years ago
- 软件逆向☆67Updated 9 years ago
- Higher-level Python interface for frida☆23Updated 7 months ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 3 years ago
- This module allows you to easily inject javascript using frida and frida-load.☆76Updated 3 weeks ago
- Files used to resolve the r2pay challenge☆55Updated 5 years ago
- rewrite dex file☆42Updated 4 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆91Updated 8 years ago
- by using Android x86 Emulator☆51Updated 6 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Updated 6 years ago
- A frida module to parse Elf headers in runtime☆37Updated 6 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- Frida module utils, writen in typescript☆16Updated 2 years ago