Lazenca / Lazenca-SLinks
Lazenca S - Anti-cheating Engine for Android Game
☆22Updated 7 years ago
Alternatives and similar repositories for Lazenca-S
Users that are interested in Lazenca-S are comparing it to the libraries listed below
Sorting:
- a android shared library dynamic loader☆18Updated 9 years ago
- android and linux injec& hook☆20Updated 8 years ago
- Lazenca A - Android Memory Cheat Tool(Engine)☆32Updated 7 years ago
- Dynamic Process name change for Android Apps☆28Updated 4 years ago
- Shared Obfuscation Headers☆17Updated 6 years ago
- Android hook by so inject☆11Updated 7 years ago
- ☆18Updated 5 years ago
- ☆54Updated 7 years ago
- hook luaL_loadbuffer dump lua files.You need to choose the loading method you like, inject or path elf.☆32Updated 4 years ago
- Multi-Utility dynamic library for Android☆19Updated 5 years ago
- based on llvm 5.0.1 release with ollvm☆37Updated 7 years ago
- android so protect☆56Updated 8 years ago
- Android Anti Root Detection☆21Updated 3 years ago
- Hide Module "frida-agent.dll", Only for Windows.☆28Updated last year
- ☆12Updated 6 years ago
- G-Presto Anti-Cheat Reverse Engineered.☆23Updated 3 years ago
- Resolve calls for internal unity engine functions☆19Updated 5 years ago
- 参照着OLLVM写的一个混淆库,只要机器上有装LLVM,就可以直接编译拿来用☆53Updated 7 years ago
- Emulator Native Hooking Framework based on Xposed☆50Updated 7 years ago
- ☆69Updated 7 years ago
- Branch based windows debugger☆21Updated 5 years ago
- Start method tracing using Android's internal APIs☆13Updated 7 years ago
- Android anti-debug method based on https://bbs.pediy.com/thread-223460.htm☆25Updated 7 years ago
- 修改版substrate Hook,使用源码编译成静态库☆14Updated 6 years ago
- A frida module to parse Elf headers in runtime☆35Updated 5 years ago
- User-friendly reference finder in IDA☆39Updated 2 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- WIP☆14Updated 3 years ago
- rewrite dex file☆42Updated 3 years ago
- 软件业的小学生☆11Updated 5 years ago