Rprop / DexStringDeobfuscator
simple dex string deobfuscator
☆10Updated 4 years ago
Related projects: ⓘ
- ☆19Updated this week
- An Xposed plugin loader without rebooting the phone☆3Updated 2 years ago
- Android-Syscall-Logger☆18Updated 3 years ago
- android hide root demo, code from Magisk☆19Updated 5 years ago
- Hook native with xposed☆16Updated 2 years ago
- A frida module to parse Elf headers in runtime☆30Updated 5 years ago
- 修改Opcode有关,写入map文件时函数末尾数据暂时有问题☆15Updated 6 years ago
- Dump process memory with FRIDA.☆14Updated 6 months ago
- ☆28Updated 2 years ago
- Dynamic Process name change for Android Apps☆28Updated 3 years ago
- 来自大表哥的剑☆22Updated 5 years ago
- read process memory with process_vm_readv☆17Updated 4 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆18Updated 4 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆26Updated 2 months ago
- ☆15Updated 3 years ago
- get android app signature without java api☆32Updated 5 years ago
- A modified android 8.1 for reverse engineer...☆10Updated 4 years ago
- Frida module utils, writen in typescript☆16Updated 7 months ago
- crypt elf dynstr or rodata section☆17Updated 5 years ago
- unpack UPX on android.☆34Updated 5 years ago
- Obfuscated Binaries☆27Updated last year
- rewrite dex file☆40Updated 2 years ago
- substrate framework for android based on frida☆15Updated 4 years ago
- zygisk插件:用于unity游戏hook☆15Updated last year
- deollvm arm64 based unicorn☆34Updated 5 years ago
- Reverse Engineering about 360 android app guard☆56Updated 4 years ago
- Android Dex Protector☆26Updated 7 years ago
- A Project for people to study android svc.☆24Updated 2 years ago
- A simple android utility for inject so (suport arm, aarch64)☆23Updated last year
- ☆25Updated last year