ApkstudioOpen-source, cross platform Qt based IDE for reverse-engineering Android application packages.
Stars: ✭ 2,246 (+338.67%)
Vscode FridaUnofficial frida extension for VSCode
Stars: ✭ 221 (-56.84%)
AmdhAndroid Mobile Device Hardening
Stars: ✭ 95 (-81.45%)
Bytecode ViewerA Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
Stars: ✭ 12,606 (+2362.11%)
XapkdetectorAPK/DEX detector for Windows, Linux and MacOS.
Stars: ✭ 208 (-59.37%)
EvabsAn open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
Stars: ✭ 173 (-66.21%)
Shed.NET runtime inspector
Stars: ✭ 229 (-55.27%)
InsiderStatic Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and easy to implement software inside your DevOps pipeline. Support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET Full Framework, C#, and Javascript (Node.js).
Stars: ✭ 216 (-57.81%)
Grapefruit(WIP) Runtime Application Instruments for iOS. Previously Passionfruit
Stars: ✭ 235 (-54.1%)
RevshellgenReverse shell generator written in Python 3.
Stars: ✭ 190 (-62.89%)
GamemaniptutorialA tutorial for manipulating the rendering of a game (generally to increase its quality) if you only have a binary available
Stars: ✭ 119 (-76.76%)
Vac HooksHook WinAPI functions used by Valve Anti-Cheat. Log calls and intercept arguments & return values. DLL written in C.
Stars: ✭ 103 (-79.88%)
R2fridaRadare2 and Frida better together.
Stars: ✭ 610 (+19.14%)
OvaaOversecured Vulnerable Android App
Stars: ✭ 152 (-70.31%)
dex2jarTools to work with android .dex and java .class files
Stars: ✭ 102 (-80.08%)
Jnitrace EngineEngine used by jnitrace to intercept JNI API calls.
Stars: ✭ 94 (-81.64%)
GtirbIntermediate Representation for Binary analysis and transformation
Stars: ✭ 190 (-62.89%)
Apk Utilities🛠 Tools and scripts to manipulate Android APKs
Stars: ✭ 134 (-73.83%)
AndroidSec记录一些我自己在学习Android逆向过程中的有意思的东西
Stars: ✭ 565 (+10.35%)
NinjaDroidNinja Reverse Engineering on Android APK packages
Stars: ✭ 224 (-56.25%)
Diff GuiGUI for Frida -Scripts
Stars: ✭ 146 (-71.48%)
Magisk Frida🔐 Run frida-server on boot with Magisk, always up-to-date
Stars: ✭ 144 (-71.87%)
DwarfFull featured multi arch/os debugger built on top of PyQt5 and frida
Stars: ✭ 916 (+78.91%)
FridacontainerFridaContainer 整合了网上流行的和自己编写的常用的 frida 脚本,为逆向工作提效之用。 frida 脚本模块化,Java & Jni Trace。
Stars: ✭ 190 (-62.89%)
PineDynamic java method hook framework on ART.
Stars: ✭ 171 (-66.6%)
FunchookHook function calls by inserting jump instructions at runtime
Stars: ✭ 253 (-50.59%)
XanalyzerxAnalyzer plugin for x64dbg
Stars: ✭ 553 (+8.01%)
LiefAuthors
Stars: ✭ 2,730 (+433.2%)
Php Malware AnalysisDeobfuscation and analysis of PHP malware captured by a WordPress honey pot
Stars: ✭ 82 (-83.98%)
IosreextensionA fast and elegant extension for VSCode used for iOSre projects.
Stars: ✭ 139 (-72.85%)
BinnaviBinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.
Stars: ✭ 2,781 (+443.16%)
DroidjackEste troyano para Android es uno de los más completos. Con él vamos a poder tener acceso a remoto a todo el dispositivo infectado, desde la agenda, las llamadas y los SMS hasta el micrófono y las cámaras del smartphone. Todo.
Stars: ✭ 44 (-91.41%)
ObfuscapkAn automatic obfuscation tool for Android apps that works in a black-box fashion, supports advanced obfuscation features and has a modular architecture easily extensible with new techniques
Stars: ✭ 456 (-10.94%)
RocketXPlugin🔥🔥 android 端编译加速插件🚀 自动识别未改动 module 并在编译流程中替换为 aar ,只编译改动模块,加速 Android apk 的编译速度。
Stars: ✭ 408 (-20.31%)
ApktoolA tool for reverse engineering Android apk files
Stars: ✭ 12,978 (+2434.77%)
PolichombrCollaborative malware analysis framework
Stars: ✭ 307 (-40.04%)
KraneKubernetes RBAC static Analysis & visualisation tool
Stars: ✭ 254 (-50.39%)
InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (-38.09%)
SuperSecure, Unified, Powerful and Extensible Rust Android Analyzer
Stars: ✭ 340 (-33.59%)
remote-adb-scanpure python remote adb scanner + nmap scan module
Stars: ✭ 19 (-96.29%)
subhook.nimsubhook wrapper for Nim https://github.com/Zeex/subhook
Stars: ✭ 15 (-97.07%)
PlthookHook function calls by replacing PLT(Procedure Linkage Table) entries.
Stars: ✭ 351 (-31.45%)
dumproidAndroid process memory dump tool without ndk.
Stars: ✭ 55 (-89.26%)
hookeyEnables all the DLCs. Like Creamapi but just for linux and a subset of Paradox games.
Stars: ✭ 87 (-83.01%)
RedditVancedReddit Android app mod inspired by Aliucord
Stars: ✭ 41 (-91.99%)
Dex65536Solve the issue with dalvik compiler limitation on 65536 methods (Unable to execute dex: method ID not in [0, 0xffff]: 65536)
Stars: ✭ 352 (-31.25%)
Intellij Java2smaliA plugin for IntelliJ IDEA & Android Studio to easily compile Java & Kotlin files to smali.
Stars: ✭ 384 (-25%)
SmaliscaStatic Code Analysis for Smali files
Stars: ✭ 284 (-44.53%)
Frickfrick - aka the first debugger built on top of frida
Stars: ✭ 267 (-47.85%)
DdisasmA fast and accurate disassembler
Stars: ✭ 325 (-36.52%)
FhexA Full-Featured HexEditor compatible with Linux/Windows/MacOS
Stars: ✭ 225 (-56.05%)
Androl4bA Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
Stars: ✭ 908 (+77.34%)
PrefPortable Reverse Engineering Framework
Stars: ✭ 127 (-75.2%)
AndroguardReverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)
Stars: ✭ 3,797 (+641.6%)
Dex OracleA pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Stars: ✭ 398 (-22.27%)