Chensem / Jeb3
Jeb3 Demo (include mips && arm64 && elf && pe && wasm decompiler) without limit
☆18Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Jeb3
- JNI Helper for IDA 7.4+☆40Updated 2 months ago
- A Go library speaking Hex-Rays IDA lumina protocol☆34Updated last year
- The Frida based fuzzer all in one☆30Updated 3 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆16Updated 4 years ago
- ☆18Updated 2 years ago
- Raw IDA Kernel API for IDAPython☆33Updated 2 years ago
- angr源码分析☆32Updated 4 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆19Updated 2 years ago
- A set of Android binary exploitation tasks for beginners.☆29Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆46Updated 7 years ago
- ☆17Updated 4 years ago
- read process memory with process_vm_readv☆17Updated 4 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- Alternative API for IDA / Hex-Rays☆72Updated last year
- PoC code for CVE-2019-14040☆25Updated 4 years ago
- IDAPython / IDC tips and tricks☆36Updated 2 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment.☆37Updated 9 months ago
- IDA (sort of) headless☆20Updated 8 months ago
- 基于angr的污点分析引擎☆37Updated 5 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆27Updated 4 years ago
- IDA SDK tech demo☆36Updated 4 years ago
- Open source of the paper "击败SOTA反混淆方法"☆18Updated 2 years ago
- An IDA processor for eBPF bytecode☆62Updated this week
- ☆28Updated 7 months ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆27Updated 2 years ago
- Dice CTF 2022 breach write-up☆14Updated 2 years ago
- A collection of POP exploits.☆29Updated 3 years ago