5peak2me / jni-encryptLinks
a demo for md5 encryption
☆42Updated 9 years ago
Alternatives and similar repositories for jni-encrypt
Users that are interested in jni-encrypt are comparing it to the libraries listed below
Sorting:
- 通过JNI实现验证App签名获取公钥☆88Updated 8 years ago
- Android安全实践☆163Updated 8 years ago
- 任意位置下获取应用context☆32Updated 9 years ago
- Android apk包res 资源混淆工具☆96Updated 8 years ago
- A service manager for android which like android.os.ServiceManager, but root is not necessary☆32Updated 9 years ago
- Obfuscator-LLVM 4.0 build & setup into NDK☆36Updated 4 years ago
- A library for check whether your app run in a virtual project.☆84Updated 7 years ago
- 通过精简Smali语法细节来增强反编译代码阅读性,自定义了一种简单语法☆74Updated 8 years ago
- A demo which use ndk to check signature md5 value, prevent .so file get used by other guys.☆39Updated 10 years ago
- Native IO Redirect implementation for Android.☆27Updated 9 years ago
- Native IO Redirect implementation for Android.☆75Updated 9 years ago
- make dex patch based on the structure of dex file☆72Updated 9 years ago
- Android native memory leak detector☆30Updated 6 years ago
- 通过Xposed框架hook android的敏感函数,具体参考https://github.com/halfkiss/ZjDroid, 并添加了相应的函数☆72Updated 6 years ago
- Android APK 加壳保护☆167Updated 8 years ago
- Android 使用jni校验应用签名sha1值,防止so文件逆向盗用☆131Updated 6 years ago
- 一种生成阅读极其困难的proguard字典的算法☆154Updated 5 years ago
- ☆57Updated 2 years ago
- Android AES sample for JNI&Java.☆111Updated 6 years ago
- NDK实现的工具库,支持AES的ECB和CBC加解密(支持emoji),MD5加盐☆110Updated 7 years ago
- 基于YAHFA和dexposed 结合的hook框架 支持4.0-7.0☆87Updated 8 years ago
- 基于mapping.txt文件,根据原始class名或方法名获取混淆后的class名或方法名,根据混淆后的class名或方法名获取原始class名或方法名,堆栈还原等☆50Updated 6 years ago
- Android安全防护的几种反调试方案策略☆174Updated 8 years ago
- 修复apktool打包出现No resource found....☆56Updated 7 years ago
- Apk parser lib with java☆39Updated 8 years ago
- OpenSSL Library for iOS and Android☆42Updated 8 years ago
- Proxy/Delegate Application☆11Updated 10 years ago
- hook java methods☆141Updated 8 years ago
- Bypassing java heap to operate images,will 100% avoid OOM (Maintenance stopped)绕过java heap操作图片,100%避开OOM☆42Updated 2 years ago
- Parse classes.dex in APK file and get strings/methods/class info. no need unzip, no need decompile,☆20Updated 8 years ago