Dexcalibur[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Stars: ✭ 512 (-57.12%)
Awesome Reverse EngineeringReverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Stars: ✭ 2,954 (+147.4%)
Awesome Mobile SecurityAn effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+53.85%)
ApkleaksScanning APK file for URIs, endpoints & secrets.
Stars: ✭ 2,707 (+126.72%)
AppmonDocumentation:
Stars: ✭ 1,157 (-3.1%)
Frida ScriptsA collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.
Stars: ✭ 665 (-44.3%)
Iostracealternative strace for iOS device(64bit) on frida
Stars: ✭ 84 (-92.96%)
OvaaOversecured Vulnerable Android App
Stars: ✭ 152 (-87.27%)
Vscode FridaUnofficial frida extension for VSCode
Stars: ✭ 221 (-81.49%)
Mobile Security Framework MobsfMobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+755.28%)
EvabsAn open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
Stars: ✭ 173 (-85.51%)
Magisk Frida🔐 Run frida-server on boot with Magisk, always up-to-date
Stars: ✭ 144 (-87.94%)
dumproidAndroid process memory dump tool without ndk.
Stars: ✭ 55 (-95.39%)
AndroidlibraryAndroid library to reveal or obfuscate strings and assets at runtime
Stars: ✭ 162 (-86.43%)
AdhritAndroid Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
Stars: ✭ 399 (-66.58%)
Jnitrace EngineEngine used by jnitrace to intercept JNI API calls.
Stars: ✭ 94 (-92.13%)
Luject🍹A static injector of dynamic library for application (android, iphoneos, macOS, windows, linux)
Stars: ✭ 203 (-83%)
remote-adb-scanpure python remote adb scanner + nmap scan module
Stars: ✭ 19 (-98.41%)
allsafeIntentionally vulnerable Android application.
Stars: ✭ 135 (-88.69%)
mobileAuditDjango application that performs SAST and Malware Analysis for Android APKs
Stars: ✭ 140 (-88.27%)
JnitraceA Frida based tool that traces usage of the JNI API in Android apps.
Stars: ✭ 534 (-55.28%)
R2fridaRadare2 and Frida better together.
Stars: ✭ 610 (-48.91%)
QbdiA Dynamic Binary Instrumentation framework based on LLVM.
Stars: ✭ 801 (-32.91%)
IosreextensionA fast and elegant extension for VSCode used for iOSre projects.
Stars: ✭ 139 (-88.36%)
Frickfrick - aka the first debugger built on top of frida
Stars: ✭ 267 (-77.64%)
DwarfFull featured multi arch/os debugger built on top of PyQt5 and frida
Stars: ✭ 916 (-23.28%)
Androl4bA Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
Stars: ✭ 908 (-23.95%)
BincatBinary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free detection
Stars: ✭ 1,078 (-9.72%)
Termux ApktoolDecompile and Recompile android aplication use termux without openjdk installed
Stars: ✭ 53 (-95.56%)
Simple Polymorphic Engine Spe32Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used to demonstrate what polymorphic engines are.
Stars: ✭ 59 (-95.06%)
OpenmoonstoneOpen source reimplementation of Moonstone: A Hard Day's Knight
Stars: ✭ 50 (-95.81%)
WslreverseExperiments with hidden COM interface and LxBus IPC mechanism in WSL
Stars: ✭ 47 (-96.06%)
Android Sitemap👓 Every link ever to Android Developer site.
Stars: ✭ 61 (-94.89%)
RedasmThe OpenSource Disassembler
Stars: ✭ 1,042 (-12.73%)
Dainsleif⚡️ A simple model cheat for CSGO a.k.a. Counter-Strike: Global Offensive.
Stars: ✭ 74 (-93.8%)
PecliCLI tool to analyze PE files
Stars: ✭ 46 (-96.15%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-96.23%)
EfiseekGhidra analyzer for UEFI firmware.
Stars: ✭ 45 (-96.23%)
MinjectMono Framework Interaction / Injection Library for .NET (C++/CLI)
Stars: ✭ 42 (-96.48%)
Axploreraxplorer - Android Permission Mappings
Stars: ✭ 68 (-94.3%)
PinkmanPINkman is a library to help implementing an authentication by a PIN code in a secure manner. The library derives hash from the user's PIN using Argon2 function and stores it in an encrypted file. The file is encrypted with the AES-256 algorithm in the GCM mode and keys are stored in the AndroidKeystore.
Stars: ✭ 59 (-95.06%)
Xoreos ToolsTools to help the development of xoreos
Stars: ✭ 38 (-96.82%)
ProtodecProtobuf decompiler
Stars: ✭ 37 (-96.9%)
App PeidPEiD detects most common packers, cryptors and compilers for PE files.
Stars: ✭ 72 (-93.97%)
Pmd RedDecompilation of Pokémon Mystery Dungeon: Red Rescue Team
Stars: ✭ 65 (-94.56%)
Vgm rippingSources for game music ripping tools
Stars: ✭ 58 (-95.14%)