enovella / Jebscripts
A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
Stars: ✭ 100
Programming Languages
java
68154 projects - #9 most used programming language
Projects that are alternatives of or similar to Jebscripts
Pentesting toolkit
🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+1168%)
Mutual labels: reverse-engineering
Pyidbutil
A python library for reading IDA pro databases.
Stars: ✭ 98 (-2%)
Mutual labels: reverse-engineering
Barf Project
BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework
Stars: ✭ 1,280 (+1180%)
Mutual labels: reverse-engineering
Zxhookutil
【iOS逆向】高效Tweak工具函数集,基于theos、monkeyDev。(含方法追踪、无须关心层级获取任意view、拦截并修改全局请求、清除keyChain数据、打印block参数、打印类的属性和方法、数据转换、数据存储、添加轮询、网络请求、加密解密等各种协助逆向分析函数)
Stars: ✭ 93 (-7%)
Mutual labels: reverse-engineering
Jnitrace Engine
Engine used by jnitrace to intercept JNI API calls.
Stars: ✭ 94 (-6%)
Mutual labels: reverse-engineering
Iostrace
alternative strace for iOS device(64bit) on frida
Stars: ✭ 84 (-16%)
Mutual labels: reverse-engineering
Ghidra Gekko Broadway Lang
Ghidra language definition for the Gekko and Broadway CPU variant used in the Nintendo GameCube and Nintendo Wii respectively
Stars: ✭ 98 (-2%)
Mutual labels: reverse-engineering
Fundamentos Engenharia Reversa
Livro: Fundamentos de Engenharia Reversa
Stars: ✭ 93 (-7%)
Mutual labels: reverse-engineering
Lighthouse
A Code Coverage Explorer for Reverse Engineers
Stars: ✭ 1,348 (+1248%)
Mutual labels: reverse-engineering
Pirogue
PiRogue is a small device meant to ease network interception and analysis.
Stars: ✭ 90 (-10%)
Mutual labels: reverse-engineering
Ida For Delphi
IDA Python Script to Get All function names from Event Constructor (VCL)
Stars: ✭ 92 (-8%)
Mutual labels: reverse-engineering
Jremapper
Remapping tool for compiled java programs.
Stars: ✭ 97 (-3%)
Mutual labels: reverse-engineering
Samsung Trustzone Research
Reverse-engineering tools and exploits for Samsung's implementation of TrustZone
Stars: ✭ 85 (-15%)
Mutual labels: reverse-engineering
Ngrev
Tool for reverse engineering of Angular applications
Stars: ✭ 1,368 (+1268%)
Mutual labels: reverse-engineering
Reverse Engineering
Reverse-Engineered Tools Count-106
Stars: ✭ 94 (-6%)
Mutual labels: reverse-engineering
JEB Android decompiler scripts
A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
JEB Python scripts
-
HelloWorld.py
- Display message box.
-
ListingMethods.py
- Print all methods in dex.
-
InvokedMethods.py
- Get caret position and print invoked methods from it.
-
RenameObfuscatedClasses.py
- Rename obfuscated class names by using super class name.
-
AlertMarker.py
- Set(unset) alert marker to focused method.
-
getMethodSignatures.py
- Get method signatures from an APK and store them into a text file for parsing it later on. (Use the Java version)
-
getMethodsFromClass.py
- Get method from a class and print them out.
-
ASTRemoveDummySwitch.py
- Remove dummy switches
-
ObadDecrypt.py
- Decrypt Obad strings before performing unreflection
-
ObadUnreflect.py
- Replace reflection calls by direct method calls
- fixObfousClass.py
JEB Java scripts
-
DeCluster.java
- Renaming obfuscated class/methods/fields names (@jcase)
-
DeClusterMod.java
- Renaming obfuscated class/methods/fields names with filter and string format added
-
DexGuardStringDecoder.java
- Decrypt DexGuard encrypted Strings (Anton Kosterin)
-
getMethodSignatures.java
- Get method signatures from an APK and store them into a text file for parsing it later on.
Extra Python scripts
-
grepDeobfuscationRoutines.py
- Filter possible obfuscator routines from a method signatures list (First use getMethodSignatures.java)
JEB Sample Scripts
Sample automation scripts for JEB(Android Interactive Decompiler).
Usage
Usage of JEB automation is here.
JEB API reference is here.
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].