EEEEhex / detxLinks
deobf tx libtprt's obfuscation
☆56Updated last year
Alternatives and similar repositories for detx
Users that are interested in detx are comparing it to the libraries listed below
Sorting:
- tprt ollvm 反混淆 修改 binja il☆50Updated last year
- deobfuscation BR☆53Updated last year
- 去除BR混淆 Deobfuscation BR☆89Updated last year
- Single-step debugging of native code using frida, stalker, and semaphore☆86Updated last year
- vm 还原的分享☆76Updated last year
- Android assembly instruction tracing tool☆138Updated 8 months ago
- 使用 frida stalker 实现的 trace☆29Updated 3 years ago
- 自實現Linker的小Demo☆75Updated 7 months ago
- A comprehensive plug-in injection toolset☆41Updated 6 months ago
- GitHub Actions to analyse file using IDA☆35Updated last year
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆38Updated 9 months ago
- 一个基于uprobe,能同时hook大量用户地址空间函数的kpm内核模块☆177Updated 5 months ago
- obpo backend server written by golang☆33Updated 2 years ago
- 反ida内联汇编花指令☆54Updated 2 years ago
- A program to read and modify the memory of other processes.☆19Updated 2 years ago
- this is Android Custom Linker by Android12 LinkerSourcesCode☆45Updated last year
- IDA Python Script for anti ollvm☆107Updated 4 years ago
- A Simple uprobe Hook Framework☆67Updated 9 months ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆53Updated last year
- ARM64 DBI DEMO☆31Updated last month
- ☆71Updated 2 years ago
- 基于 Unicorn 引擎的轻量级 ARM64 动态追踪模拟工具。支持 IDA Pro、生成 Tenet 日志、本地代码模拟、内存转储、寄存器状态追踪和指令级日志记录。☆166Updated this week
- ☆46Updated last year
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆33Updated last year
- ☆122Updated 3 years ago
- A rootkit for Android.☆59Updated last year
- monitor svc calls of android☆74Updated 7 years ago
- A simple android utility for inject so (suport arm, aarch64)☆28Updated 2 years ago
- Android arm arm64-v8a ShellCode Generate☆30Updated 5 months ago