Lazenca / Lazenca-A-Andoird
Lazenca A - Android Memory Cheat Tool(Engine)
☆32Updated 7 years ago
Alternatives and similar repositories for Lazenca-A-Andoird
Users that are interested in Lazenca-A-Andoird are comparing it to the libraries listed below
Sorting:
- JNI Helper Plugin☆53Updated 5 months ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- IDA plugin aid to set android so breakpoint☆32Updated 7 years ago
- unpack UPX on android.☆35Updated 5 years ago
- android arm64(aarch64) code inject☆39Updated 10 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆28Updated 5 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 7 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- Android Injector☆23Updated 8 years ago
- ☆54Updated 7 years ago
- ☆32Updated 5 years ago
- ☆32Updated last month
- some idapython scripts for android debugging.☆44Updated 7 years ago
- ☆41Updated 8 years ago
- A frida module to parse Elf headers in runtime☆35Updated 5 years ago
- An android hook tools based on cydia substrate☆26Updated 9 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Updated 11 years ago
- Start method tracing using Android's internal APIs☆13Updated 7 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- rewrite dex file