HHBO / WxapkgParserLinks
解析微信小程序包
☆16Updated 7 years ago
Alternatives and similar repositories for WxapkgParser
Users that are interested in WxapkgParser are comparing it to the libraries listed below
Sorting:
- ☆94Updated 7 years ago
- xposedLuaHook☆68Updated 6 years ago
- 基于Frida的脱壳工具☆12Updated 7 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆15Updated 6 years ago
- Inspector server for android☆47Updated last year
- 生成frida框架hook java的js代码☆88Updated 7 years ago
- framenthook☆63Updated 6 years ago
- 修复AndroidManifest.xml☆32Updated 9 years ago
- ☆23Updated 7 years ago
- android逆向的IDA脚本收集☆75Updated 8 years ago
- ☆54Updated 8 years ago
- 利用android_inject和hookZz框架写的Android zygote注入andorid程序☆37Updated 6 years ago
- ☆70Updated 7 years ago
- 安卓so内存加载劫持☆120Updated 8 years ago
- Xposed module logging HTTP(S) requests made via OkHttp☆50Updated 5 years ago
- 利用android_inject和hookZz框架写的一个Android zygote注入andorid程序,进行中☆12Updated 7 years ago
- 类太极☆34Updated 5 years ago
- Fart脱壳后指令抽取修复 jadx对抗 对抗jadx Fart脱壳 Android脱壳 dexDump dex主动抽取☆99Updated 4 years ago
- 自动加固Android App☆86Updated 7 years ago
- 简易dex混淆器☆46Updated 10 years ago
- some frida script☆10Updated 6 years ago
- getSharedPreferences的 MODE_WORLD_READABLE 在7.0以上会闪退,所以用contentprovider去替换。这里只提供出具体的两个实现类,根据自己的业务看着改吧。☆21Updated 5 years ago
- ☆30Updated 2 years ago
- apimonitor ZjDroid是基于Xposed Framewrok的动态逆向分析模块,逆向分析者可以通过ZjDroid完成以下工作: DEX文件的内存dump 基于Dalvik关键指针的内存BackSmali,有效破解加固应用 敏感API的动态监控 指定内存区域数…☆56Updated 8 years ago
- ☆21Updated 5 years ago
- demo for inject & hook in sandbox☆61Updated 6 years ago
- hook ime,进行键盘记录or输入控制,发挥你的想象.....☆40Updated 7 years ago
- 解析Android中so文件格式☆89Updated 8 years ago
- ☆67Updated 2 years ago
- jeb Decrypt python script☆20Updated 6 years ago