Thehepta / HeptaManualLinks
☆11Updated last year
Alternatives and similar repositories for HeptaManual
Users that are interested in HeptaManual are comparing it to the libraries listed below
Sorting:
- Obfuscated Binaries☆29Updated 2 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆31Updated last year
- ☆31Updated 3 years ago
- AArch64 inlineHook☆51Updated 3 years ago
- 使用 frida stalker 实现的 trace☆28Updated 2 years ago
- deobf tx libtprt's obfuscation☆46Updated 11 months ago
- ☆28Updated 7 months ago
- ☆44Updated last year
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆28Updated 4 months ago
- Android So Fix☆26Updated 6 years ago
- Android eBPF sample☆47Updated 3 years ago
- unidbg和IDAPython相关学习☆13Updated 2 months ago
- Android-Syscall-Logger☆22Updated 4 years ago
- rewrite dex file☆42Updated 3 years ago
- ☆22Updated 4 years ago
- ☆21Updated 5 years ago
- obpo backend server written by golang☆32Updated last year
- A frida module to parse Elf headers in runtime☆35Updated 6 years ago
- unicorn demo☆26Updated 4 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆61Updated 2 years ago
- typescript autocomplete plugin for frida's java warpper☆38Updated last year
- deobfuscation BR☆49Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- Simple Android ARM&ARM64 GOT Hook☆37Updated 3 years ago
- ☆22Updated 3 years ago
- Reverse Engineering about 360 android app guard☆58Updated 5 years ago
- try try full features ebpf on android without Pixel 6☆21Updated 2 years ago
- ARM64 Assembly Code and Memory Simulator☆33Updated last year
- ☆58Updated 3 years ago
- 一个简易的unicorn tracer,剪裁自项目Rainbow。☆27Updated 4 years ago