Chensem / Jeb3
Jeb3 Demo (include mips && arm64 && elf && pe && wasm decompiler) without limit
☆18Updated 5 years ago
Alternatives and similar repositories for Jeb3:
Users that are interested in Jeb3 are comparing it to the libraries listed below
- The Frida based fuzzer all in one☆30Updated 4 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆27Updated 5 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆16Updated 5 years ago
- PoC code for CVE-2019-14040☆26Updated 4 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- ☆17Updated 5 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 2 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆66Updated 5 years ago
- ☆18Updated 2 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- This is an IDA plugin to recover class information from C++ binary.☆18Updated 4 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆34Updated last year
- ☆39Updated 3 years ago
- JNI Helper for IDA 7.4+☆40Updated 7 months ago
- A collection of POP exploits.☆29Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- Raw IDA Kernel API for IDAPython☆33Updated 2 years ago
- A bunch of JEB python scripts☆46Updated 3 years ago
- Open source of the paper "击败SOTA反混淆方法"☆18Updated 2 years ago
- A IDA plugin to show ARM MSRs nicely☆83Updated 2 years ago
- 基于angr的污点分析引擎☆39Updated 5 years ago
- A frida module to parse Elf headers in runtime☆32Updated 5 years ago
- Dice CTF 2022 breach write-up☆15Updated 3 years ago
- unpack UPX on android.☆35Updated 5 years ago
- JNI Helper Plugin☆52Updated 3 months ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆19Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆42Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- ☆11Updated 2 years ago
- ☆28Updated last year