Lazenca / Lazenca-A-Andoird
Lazenca A - Android Memory Cheat Tool(Engine)
☆32Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Lazenca-A-Andoird
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- ☆32Updated 5 years ago
- JNI Helper Plugin☆52Updated 3 years ago
- unpack UPX on android.☆35Updated 5 years ago
- Lazenca S - Anti-cheating Engine for Android Game☆18Updated 6 years ago
- Android app for demonstrating native library harnessing☆41Updated 5 years ago
- A frida module to parse Elf headers in runtime☆31Updated 5 years ago
- IDA plugin aid to set android so breakpoint☆31Updated 6 years ago
- android arm64(aarch64) code inject☆38Updated 9 years ago
- ElfHooK, reference with boyliang's AllHookInOne project, fix bugs, support android 5/6/7 and aarch64☆29Updated 2 years ago
- ☆32Updated 11 months ago
- some idapython scripts for android debugging.☆44Updated 7 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 6 years ago
- ☆39Updated 7 years ago
- Android Library Code Recognition☆78Updated 6 months ago
- Android Injector☆23Updated 7 years ago
- Android rootkit☆40Updated 8 years ago
- Android library for detecting Android virtual containers.☆67Updated 3 years ago
- Utility to read custom structure from Tencent's libshell packer☆37Updated 5 years ago
- rewrite dex file☆40Updated 2 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆27Updated 4 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆45Updated 7 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆18Updated 4 years ago
- ☆73Updated 7 years ago
- Some reverse-engineering scripts☆113Updated 5 years ago
- a android shared library dynamic loader☆17Updated 8 years ago
- ☆50Updated 8 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆89Updated 6 years ago