DoranekoSystems / DynaDbgLinks
Next-Generation Remote Analysis Suite for Reverse Engineering.
☆307Updated this week
Alternatives and similar repositories for DynaDbg
Users that are interested in DynaDbg are comparing it to the libraries listed below
Sorting:
- Frida's setHardwareWatchpoint tutorial☆63Updated last year
- Getting better stacks and backtraces in Frida☆58Updated last month
- Traces syscalls on iOS via Frida, including Mach syscalls.☆99Updated 3 months ago
- 基于 Unicorn 引擎的轻量级 ARM64 动态追踪模拟工具。支持 IDA Pro、生成 Tenet 日志、本地代码模拟、内存转储、寄存器状态追踪和指令级日志记录。☆168Updated last week
- An LLVM Pass from Hikari-LLVM15☆142Updated 11 months ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆235Updated 3 months ago
- IDA plugin to aid with Swift reverse engineering☆40Updated last year
- Mobile app memory view & edit PyQt6 program☆72Updated 8 months ago
- Injecting into SELinux-protected system service processes under root on Android.☆50Updated last year
- Assisting Go Analysis and Reversing☆96Updated 2 months ago
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆90Updated 9 months ago
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆233Updated 9 months ago
- ☆59Updated 2 years ago
- Stealth patch for Frida, stealth knowledge collection☆114Updated last year
- Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable Linux kernels v5.10.x.☆237Updated 2 weeks ago
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆65Updated last year
- Ghidra's IDA like experience by @NyaMisty☆48Updated 3 months ago
- ☆59Updated 11 months ago
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆73Updated last year
- Plugin to ease reversing iOS projects☆118Updated last month
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆40Updated last year
- IDA Domain API - Python interface for IDA Pro reverse engineering platform☆231Updated this week
- Find JNI native methods while the app is running.☆21Updated last year
- RevEng.AI IDA Pro Plugin☆126Updated last week
- IDA helper plugin to reverse engineer Objective-C code☆42Updated 7 months ago
- PoC showing a method to hide syscalls on XNU (arm64 macOS and iOS) from static analysis☆30Updated 3 years ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆152Updated last year
- 去除BR混淆 Deobfuscation BR☆89Updated last year
- tprt ollvm 反混淆 修改 binja il☆50Updated last year
- An Obfuscator for LLVM 19-20☆116Updated 2 months ago