HNIdesu / FART_Android11Links
兼容安卓11的Fart
☆15Updated last year
Alternatives and similar repositories for FART_Android11
Users that are interested in FART_Android11 are comparing it to the libraries listed below
Sorting:
- ☆143Updated last year
- KeyFinder 是一个Unidbg插件,通过内存检索的方式查找AES的密钥,增强Unidbg分析和还原算法的能力。☆197Updated 4 years ago
- ☆128Updated 4 years ago
- GirlHook is a Lua-scriptable ART hook framework designed for dynamic method interception and gadget-level instrumentation on Android. G.I…☆194Updated 6 months ago
- 安卓逆向学习☆102Updated 4 months ago
- 这是一个Android Project,具备设备指纹采集,设备安全检测的能力☆254Updated last month
- LSPosed模块的两个利器:classmonitor和jnitrace☆189Updated last year
- use unidbg to emulate dy23.3.0 for X-Medusa, X-Helios☆74Updated 3 years ago
- ☆76Updated last week
- ☆125Updated 3 years ago
- ☆88Updated last year
- FunJni(JNITrace & hook ,So分析神器 )☆133Updated 2 years ago
- this is frida trace assemble and register change tools☆172Updated 2 years ago
- An anti detection version frida-server for android.☆54Updated 3 years ago
- blackbox☆265Updated 9 months ago
- 编译Pixel3上的KernelSU☆21Updated last year
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆242Updated 2 years ago
- Hook ArtMethod::RegisterNative 动态注册无法逃离这个函数 防止某些app自实现动态注册,不走jni的registerNatives☆39Updated 4 years ago
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆275Updated 8 months ago
- 基于Riru模块的改机模块☆88Updated 4 years ago
- Xposed免root注入so方案, 支持android各个版本☆237Updated last year
- 使用 Frida Stalker 反 OLLVM 算法还原(函数调用分析、参数分析、打印调用堆栈、指令&寄存器Trace)。 Using Frida Stalker to Bypass OLLVM and Restore (Function Call Analysis, …☆73Updated 4 months ago
- 《Android设备指纹攻防&风险环境检测》资料☆94Updated 3 months ago
- ☆53Updated 2 years ago
- use androidNativeEmu to emulate the sign of X-Medusa, X-Helios of dy233☆36Updated 3 years ago
- 无需proto文件 对protobuf解包 组包☆65Updated last year
- 一款二进制逆向调试工具,用于内存数据查看、修改、获取等操作☆36Updated 2 years ago
- stalker trace cpp☆86Updated 2 months ago
- Generate Frida Script☆121Updated 2 years ago
- Overt是一款功能强大的Android设备安全检测工具☆214Updated 2 weeks ago