FishMan132 / llvm-pass-tutorialLinks
learn llvm
☆14Updated 5 years ago
Alternatives and similar repositories for llvm-pass-tutorial
Users that are interested in llvm-pass-tutorial are comparing it to the libraries listed below
Sorting:
- 使用Unicorn解密Hikari加密过的字符串(觉得好的话给个star呗!)☆54Updated 6 years ago
- IDA Python Script for anti ollvm-arm☆28Updated 4 years ago
- substrate framework for android based on frida☆16Updated 5 years ago
- CPU模拟利器:Unicorn☆25Updated 11 months ago
- unpack UPX on android.☆34Updated 6 years ago
- Open source of the paper "击败SOTA反混淆方法"☆18Updated 3 years ago
- unicorn demo☆26Updated 5 years ago
- anti ollvm like flat/bcf/sub☆72Updated 6 years ago
- Simulator/interpreter for Arm64 machine language☆14Updated 3 years ago
- ARM平台逆向工程学习笔记☆15Updated 7 years ago
- 白盒CLEFIA加密算法☆14Updated 9 years ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- deollvm arm64 based unicorn☆35Updated 6 years ago
- ☆21Updated 7 years ago
- Custom linker implemented with Segmentation Fault handler☆21Updated 5 years ago
- 详细说明及演示MMU相关原理及过程(用于理解Linux内核Root Kernelpatch)☆22Updated last year
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆29Updated 5 years ago
- 010Editor template for .abc (Open/HarmonyOS Ark Bytecode) files☆41Updated last year
- 利用angr去除ollvm的虚假控制流☆13Updated 4 years ago
- OLLVM_Deobfuscation 是一款ollvm反混淆工具,目前已经能完美实现x86架构Linux平台下,被ollvm混淆过的C/C++代码的反混淆,后续将逐步尝试Android SO文件的反混淆☆21Updated 8 years ago
- rewrite dex file☆41Updated 3 years ago
- ARM Emulator Developing(interp + jit + aot)☆27Updated 5 years ago
- ☆52Updated 7 years ago
- Xcode OLLVM8.0 && Android NDK r16b OLLVM6.0☆17Updated 5 years ago
- Simple Android ARM&ARM64 GOT Hook☆36Updated 3 years ago
- ☆15Updated 4 years ago
- A frida module to parse Elf headers in runtime☆36Updated 6 years ago
- a java decompiler demo☆15Updated last year
- deobfuscation ollvm's fla☆67Updated 7 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆42Updated last year