Mas0nShi / jsc-DecryptionLinks
decrypts the coco2d-js.jsc file
☆22Updated 4 years ago
Alternatives and similar repositories for jsc-Decryption
Users that are interested in jsc-Decryption are comparing it to the libraries listed below
Sorting:
- ☆63Updated 7 years ago
- 执行 wasm 转换出来的 C 代码,代码例子☆14Updated 7 years ago
- ☆54Updated 2 years ago
- Dump and fix the android so file☆40Updated 4 years ago
- android应用反调试以及反内存dump代码收集☆32Updated 9 years ago
- Flutter/Dart Snapshot Reverse Tool。☆44Updated 2 years ago
- 主要记录我对市面上一些android的壳逆向分析和参考借鉴☆30Updated 3 years ago
- codeless Android hook (experimental)☆68Updated 3 years ago
- deobf tx libtprt's obfuscation☆56Updated last year
- a reverse engineering tool for android cocos2d-js engine application.☆68Updated 2 years ago
- ☆27Updated 3 years ago
- deollvm arm64 based unicorn☆35Updated 6 years ago
- 学习肉丝大佬的逆向笔记☆16Updated 5 years ago
- ☆71Updated 2 years ago
- Collect Frida related projects for learning only☆23Updated 4 years ago
- ☆44Updated 4 years ago
- jsc decompiler, SpiderMonkey, modify for decoding cocos2d jsc file. On ubuntu 14.04 LTS☆56Updated 6 years ago
- Python3 useful scripts.☆34Updated 5 years ago
- patch ext☆20Updated last year
- demo for inject & hook in sandbox☆61Updated 7 years ago
- HowToReserveFlutter is some reverse flutter note 。flutter逆向笔记,如何一步一步分析 flutter apk。☆46Updated 3 years ago
- 黑盒BlackBox,是一款虚拟引擎,支持5.0~12.0,可以在Android上克隆、运行虚拟应用,拥有免安装运行能力,已集成Xposed框架。黑盒可以掌控被运行的虚拟应用,做任何想做的事情。☆30Updated 4 years ago
- Flutter Mobile Application Reverse Engineering Tool☆13Updated last week
- ☆24Updated 6 years ago
- ☆100Updated 3 years ago
- 执行引擎-Virtual Code Framework for V-CPU/VMProtect/ARM-Translator☆22Updated 5 years ago
- ☆55Updated 2 years ago
- a simple tool for easyily dev/debug using frida and write module for agent. (mainly used for android)☆84Updated 6 months ago
- ELF 加固,暂时支持dalvik模式☆45Updated 7 years ago
- 主要记录对各路frida脚本的整理,长期更新☆34Updated 2 years ago