PShocker / de-ollvmLinks
IDA Python Script for anti ollvm
☆107Updated 4 years ago
Alternatives and similar repositories for de-ollvm
Users that are interested in de-ollvm are comparing it to the libraries listed below
Sorting:
- ☆122Updated 3 years ago
- 基于 Unicorn 引擎的轻量级 ARM64 动态追踪模拟工具。支持 IDA Pro、生成 Tenet 日志、本地代码模拟、内存转储、寄存器状态追踪和指令级日志记录。☆155Updated last month
- vm 还原的分享☆76Updated last year
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆232Updated 3 weeks ago
- AntiOllvm Fla with Fake Runtime☆177Updated 11 months ago
- 去除BR混淆 Deobfuscation BR☆88Updated last year
- ☆123Updated 3 years ago
- ☆56Updated 2 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆84Updated last year
- 一个基于uprobe,能同时hook大量用户地址空间函数的kpm内核模块☆176Updated 5 months ago
- monitor svc calls of android☆74Updated 7 years ago
- Android assembly instruction tracing tool☆133Updated 8 months ago
- Automatically de-obfuscate ollvm and generate binaries☆116Updated 3 years ago
- ☆89Updated 9 months ago
- deobfuscator llvm arm64 script☆95Updated 6 years ago
- 反ida内联汇编花指令☆54Updated 2 years ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- 安卓绕过ptrace反调试☆71Updated 5 years ago
- A program to read and modify the memory of other processes.☆18Updated 2 years ago
- 简单的基于llvm实现vmp保护☆200Updated 3 months ago
- Seccomp + Signal Intercept SVC☆90Updated 2 years ago
- tprt ollvm 反混淆 修改 binja il☆49Updated last year
- ☆162Updated 5 years ago
- 一个基于ptrace-seccomp简单的重定向openat的demo☆80Updated 3 years ago
- frida dump android elf, support spawn and attach mode☆82Updated last year
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆77Updated 3 years ago
- Personal Notes for Reversing Research(sometimes for Security)☆58Updated 3 years ago
- deobf tx libtprt's obfuscation☆54Updated last year
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆60Updated 3 years ago
- 对目标函数进行trace 只适用于 arm64☆147Updated 3 months ago