RevealedSoulEven / promon-string-deobfuscatorLinks
Promon Shield String Deobfuscator
☆38Updated 7 months ago
Alternatives and similar repositories for promon-string-deobfuscator
Users that are interested in promon-string-deobfuscator are comparing it to the libraries listed below
Sorting:
- You can bypass various Android security system checks such as Signature Verification, Integrity Check, etc. with this repo.☆69Updated 3 years ago
- Use LD-Preload to Inject a shared library on any android version and architecture☆57Updated 2 years ago
- vApp-Inject is a Virtual Box application project designed to provide users with the ability to run Android games and apps independently w…☆22Updated last year
- A Reversal and bypass for Appsealing☆80Updated last year
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆64Updated last year
- PoC of using android:name attribute for hooking☆21Updated 2 months ago
- Remap a library to avoid detection☆129Updated last year
- ☆59Updated 9 months ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆73Updated 3 years ago
- with this repo you can bypass libpairipcore tamper and signature protection☆44Updated 7 months ago
- frida runtime resolves smali☆90Updated 6 months ago
- A zygisk module that dumps so file from process memory☆91Updated last year
- A Frida Mod Menu for Android Games inspired by Android-Mod-Menu by LGLTeam☆71Updated 2 years ago
- ☆58Updated 2 years ago
- Simple frida anti-detection patch☆49Updated 9 months ago
- SherlockElf is a powerful tool designed for both static and dynamic analysis of Android ELF binaries and dynamic iOS Macho-O binaries (ex…☆99Updated last month
- Small Apps As PoC to Detect Frida With Frida☆55Updated 3 years ago
- Android APK Obfuscator☆14Updated 4 years ago
- Dump Memory Segment From Process Memory and Rebuild ELF So Binaries☆30Updated 4 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆23Updated last year
- Deobfuscate "paranoid" protected apps☆71Updated 8 months ago
- Android aarch64 kernel rootkit(driver module)☆109Updated last month
- This repository will contain all the scripts and techniques we have used to bypass MSTG crackme challenges.☆19Updated 2 years ago
- A POC to detect zygisk☆69Updated 6 months ago
- encryption for mobile android applications☆47Updated 6 years ago
- ☆50Updated 2 years ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆165Updated 10 months ago
- A Frida script for hooking Android apps on arm/arm64 devices. It intercepts android_dlopen_ext, detects popular protectors (e.g., DexProt…☆43Updated last month
- An Android Injector aimed to inject through Virtual Space without root permissions☆170Updated 10 months ago
- Forked from codehasan/dex2c☆18Updated 10 months ago