PShocker / de-ollvmLinks
IDA Python Script for anti ollvm
☆107Updated 4 years ago
Alternatives and similar repositories for de-ollvm
Users that are interested in de-ollvm are comparing it to the libraries listed below
Sorting:
- ☆122Updated 3 years ago
- ☆123Updated 3 years ago
- vm 还原的分享☆76Updated last year
- 去除BR混淆 Deobfuscation BR☆89Updated last year
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆239Updated last month
- AntiOllvm Fla with Fake Runtime☆179Updated last year
- 一个基于uprobe,能同时hook大量用户地址空间函数的kpm内核模块☆179Updated 5 months ago
- ☆57Updated 2 years ago
- Android assembly instruction tracing tool☆138Updated 8 months ago
- 反ida内联汇编花指令☆54Updated 2 years ago
- ☆91Updated 10 months ago
- Automatically de-obfuscate ollvm and generate binaries☆116Updated 3 years ago
- monitor svc calls of android☆74Updated 7 years ago
- deobfuscator llvm arm64 script☆96Updated 6 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆86Updated last year
- 简单的基于llvm实现vmp保护☆208Updated 4 months ago
- 一个基于ptrace-seccomp简单的重定向openat的demo☆80Updated 3 years ago
- deobf tx libtprt's obfuscation☆56Updated last year
- tprt ollvm 反混淆 修改 binja il☆50Updated last year
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- A program to read and modify the memory of other processes.☆19Updated 2 years ago
- 安卓绕过ptrace反调试☆72Updated 5 years ago
- 帮助逆向者使用ida便利地调试apk so文件,抛开调试前的那些麻烦步骤☆44Updated 3 years ago
- frida dump android elf, support spawn and attach mode☆83Updated last year
- ☆55Updated last month
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆77Updated 3 years ago
- ☆162Updated 6 years ago
- Seccomp + Signal Intercept SVC☆90Updated 2 years ago
- deobfuscation BR☆53Updated last year
- Instruction tracer powered by Frida☆153Updated 7 months ago