数盟可信id的获取
☆82May 14, 2024Updated last year
Alternatives and similar repositories for smid_project
Users that are interested in smid_project are comparing it to the libraries listed below
Sorting:
- 梆梆企业加固详细逆向分析过程, 包含两种对该加固的脱壳机(直接解密classes0.jar和基于frida hook)☆477Jul 25, 2019Updated 6 years ago
- 生成frida框架hook java的js代码☆88Sep 24, 2017Updated 8 years ago
- framenthook☆62Aug 22, 2019Updated 6 years ago
- deollvm arm64 based unicorn☆35Jul 4, 2019Updated 6 years ago
- Reverse libsgmain 聚安全sgmain逆向☆116Jun 1, 2020Updated 5 years ago
- Allows you to partly emulate an Android native library.☆361Jul 16, 2020Updated 5 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 8 months ago
- Penguin Xposed Framework☆10Apr 15, 2019Updated 6 years ago
- Mobile CTF Solutions☆216Mar 29, 2021Updated 4 years ago
- 网站前端代码☆45Aug 26, 2021Updated 4 years ago
- Reverse Engineering about 360 android app guard☆59Feb 27, 2020Updated 6 years ago
- ☆11Oct 22, 2019Updated 6 years ago
- Various Jeb plugins, including obfuscation restore☆15Jun 3, 2015Updated 10 years ago
- ☆10Aug 31, 2019Updated 6 years ago
- ☆14Sep 11, 2019Updated 6 years ago
- 本项目整合了各大厂商获取 OAID 的原生方法☆417Dec 12, 2023Updated 2 years ago
- some useful adb commands for android reversing and debugging both 32 and 64 bit and support macOS and win10's MINGW64.☆319Dec 15, 2020Updated 5 years ago
- ☆15May 18, 2020Updated 5 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- 基于Flask框架和frida开发的一款frida server☆12Nov 5, 2019Updated 6 years ago
- 使用Unicorn解密Hikari加密过的字符串(觉得好的话给个star呗!)☆56Sep 17, 2019Updated 6 years ago
- Syscall table hook frame in Android kernel for arm and arm64☆82May 29, 2017Updated 8 years ago
- This is a library that can load installed xposed modules and load xposed modules by file path. And native libraries in the xposed module…☆138May 21, 2023Updated 2 years ago
- an android method tracer gui tool base-on frida☆476Oct 30, 2019Updated 6 years ago
- ☆160Apr 9, 2018Updated 7 years ago
- Start method tracing using Android's internal APIs☆13Dec 25, 2017Updated 8 years ago
- ☆52Sep 5, 2018Updated 7 years ago
- ☆56Nov 9, 2016Updated 9 years ago
- Instructions tracing powered by frida☆183Jul 8, 2019Updated 6 years ago
- Load dex on ART in interpret mode☆19Dec 14, 2018Updated 7 years ago
- 体积小巧功能强大的网络封包嗅探分析工具-snifferview☆15Nov 19, 2019Updated 6 years ago
- MonkeyDev 支持Xcode 12安装☆14Jun 15, 2022Updated 3 years ago
- PoC Frida script to view Android libbinder traffic☆141Jul 27, 2024Updated last year
- Tool to decompile & extract Android Dex bytecode from Vdex files☆20Oct 22, 2021Updated 4 years ago
- Frida uses libunwind for generating backtraces on some platforms☆17Jun 22, 2024Updated last year
- crypt elf dynstr or rodata section☆19Jul 3, 2019Updated 6 years ago
- The radare2 + frida book for Mobile Application assessment☆40Jan 11, 2019Updated 7 years ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆232Sep 5, 2020Updated 5 years ago
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago