A simple hexdump module for Python.
The preferred installation method is:
pip install simple-hexdump
// Mangled as __dl__ZL10call_arrayIPFviPPcS1_EEvPKcPT_mbS5_ in /system/bin/linker64 | |
template <typename F> | |
static void call_array(const char* array_name __unused, | |
F* functions, | |
size_t count, | |
bool reverse, | |
const char* realpath) { | |
if (functions == nullptr) { | |
return; |
import android.app.AppComponentFactory; | |
import android.content.pm.ApplicationInfo; | |
import android.util.Log; | |
import java.io.IOException; | |
import java.nio.ByteBuffer; | |
import java.nio.channels.Channels; | |
import java.util.ArrayList; | |
import java.util.List; | |
import java.util.zip.ZipFile; |
#!/bin/bash | |
# | |
# patch ramdisk.img (for installing Magisk on x64 Android emulator) | |
# | |
# x86_64 on Android 12 (API Level 32) is supported/tested currently | |
# | |
# install AVD: | |
# | |
# sudo sdkmanager 'system-images;android-32;google_apis_playstore;x86_64' |
Before run the adb command you must enable the Developer Options on your Android phone, then enable USB Debug (to use ADB) and disable Permission Monitoring
Run:
adb shell service call isms 5 i32 1 s16 "com.android.mms.service" s16 "null" s16 "+39phonenumber" s16 "null" s16 "hello\ world\ " s16 "null" s16 "null" i32 1 i32 0
The method is :
Android Emulator (ARM64) on EC2 - 2022 | |
--------------------------------------- | |
1. Launch EC2 ARM based Instance (a1.metal / a1.2xlarge): (16 Gb RAM, 32Gb Disk), Ubuntu Server 22.04 LTS (HVM) ARM x64 | |
2. sudo apt update && sudo apt upgrade | |
3. sudo apt install default-jdk python3-pip repo python-is-python3 unzip libpcre2-dev adb | |
4. wget https://dl.google.com/android/repository/commandlinetools-linux-8512546_latest.zip | |
5. unzip commandlinetools-linux-8512546_latest.zip -d android-sdk | |
6. sudo mv android-sdk /opt/ | |
7. mkdir /opt/android-sdk/cmdline-tools/latest | |
8. mv /opt/android-sdk/cmdline-tools/* /opt/android-sdk/cmdline-tools/latest (ignore the error) |
# see https://httptoolkit.tech/blog/chrome-android-certificate-transparency/ | |
# put your Burp cacert.der in the current working directory! | |
FINGERPRINT=`openssl x509 -in cacert.der -inform der -pubkey -noout | openssl pkey -pubin -outform der | openssl dgst -sha256 -binary | openssl enc -base64` | |
echo "chrome --ignore-certificate-errors-spki-list=$FINGERPRINT" > chrome.sh | |
adb push chrome.sh /data/local/tmp/chrome.sh | |
adb shell su -c cp /data/local/tmp/chrome.sh /data/local/chrome-command-line | |
adb shell su -c cp /data/local/tmp/chrome.sh /data/local/android-webview-command-line |
const makeCodeAllocator = require('./alloc'); | |
const { | |
jvmtiVersion, | |
jvmtiCapabilities, | |
EnvJvmti | |
} = require('./jvmti'); | |
const { parseInstructionsAt } = require('./machine-code'); | |
const memoize = require('./memoize'); | |
const { checkJniResult, JNI_OK } = require('./result'); | |
const VM = require('./vm'); |