Jackrin / BoomBeach-ArxanBypass-ModsLinks
Frida scripts to bypass Arxan protection on Boom Beach plus some mods.
☆23Updated last year
Alternatives and similar repositories for BoomBeach-ArxanBypass-Mods
Users that are interested in BoomBeach-ArxanBypass-Mods are comparing it to the libraries listed below
Sorting:
- Analysis and proof-of-concept bypass of Promon SHIELD's Android application protection☆158Updated 2 years ago
- Use LD-Preload to Inject a shared library on any android version and architecture☆54Updated last year
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆62Updated 9 months ago
- Promon Shield String Deobfuscator☆38Updated 4 months ago
- Capture input events of any android application☆48Updated last year
- A zygisk module that dumps so file from process memory☆91Updated 10 months ago
- Android assembly instruction tracing tool☆110Updated 4 months ago
- ☆28Updated 2 months ago
- Inject a shared library into a process using ptrace☆241Updated last year
- with this repo you can bypass libpairipcore tamper and signature protection☆41Updated 4 months ago
- A Reversal and bypass for Appsealing☆76Updated 11 months ago
- android jni trace for arm64 for magisk module!☆80Updated 2 months ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆143Updated 7 months ago
- Remap a library to avoid detection☆127Updated last year
- SherlockElf is a powerful tool designed for both static and dynamic analysis of Android ELF binaries and dynamic iOS Macho-O binaries (ex…☆93Updated 2 weeks ago
- Android arm arm64-v8a ShellCode Generate☆28Updated last month
- Android web based memory scanner & editor.☆18Updated last year
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆71Updated 2 years ago
- 用于练手的环境检测的demo☆84Updated last year
- AntiOllvm Fla with Fake Runtime☆172Updated 7 months ago
- frida runtime resolves smali☆85Updated 3 months ago
- 一个用于在安卓平台上进行主动调用来dump unity手游的so模块。☆63Updated 3 months ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆22Updated last year
- Single-step debugging of native code using frida, stalker, and semaphore☆82Updated 10 months ago
- Il2CppDumper for Call of Duty☆34Updated 11 months ago
- 去除BR混淆 Deobfuscation BR☆79Updated last year
- ☆54Updated 6 months ago
- ☆45Updated 2 years ago
- Find JNI native methods while the app is running.☆21Updated 10 months ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆119Updated last year