aimardcr / MLBB-MetadataLinks
A simple code to decrypt global-metadata.dat for Mobile Legends: Bang Bang
☆9Updated 3 years ago
Alternatives and similar repositories for MLBB-Metadata
Users that are interested in MLBB-Metadata are comparing it to the libraries listed below
Sorting:
- zygisk插件:用于unity游戏hook☆19Updated 2 years ago
- use xposed inject so☆17Updated 5 years ago
- ☆12Updated 4 years ago
- 来自大表哥的剑☆24Updated 6 years ago
- Inject so and dump what you want,this project use libil2cpp.so for example☆38Updated 5 years ago
- A Project for people to study android svc.☆25Updated 2 years ago
- android8 arm64 注入方案☆36Updated 4 years ago
- Inotify监听测试☆34Updated 3 years ago
- Android Shared Library Mod Injector (Ptrace). Android 5 ~ 14 (arm, arm64, x86, x86_64) + Emulator.☆13Updated 9 months ago
- 停止分享有关于腾讯mtp保护的研究☆8Updated 5 years ago
- Dump Memory Segment From Process Memory and Rebuild ELF So Binaries☆31Updated 4 years ago
- Hook native with xposed☆17Updated 3 years ago
- APatch KernelPatch QEMU Debug Environment☆22Updated 10 months ago
- hwBreakpoint Test App☆19Updated 2 years ago
- Combine Dobby and QBDI☆17Updated last year
- ☆30Updated 2 years ago
- ☆12Updated 2 years ago
- Reverse Engineering about 360 android app guard☆58Updated 5 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- ☆21Updated 5 years ago
- ☆58Updated 3 years ago
- it's a ptrace injector based app who can load a cheat menu inside PUBG externally made for educational purpose only☆20Updated last year
- This is an unofficial mirror of https://gitee.com/geekneo/A64Dbg☆18Updated last month
- linux x86_64 and arm64 syscall hook☆20Updated last year
- Android Inject☆14Updated 2 years ago
- This is a xposed module showing how to hook java and native code.☆12Updated 3 years ago
- ☆18Updated 3 years ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆16Updated last year
- HikariOnWindowsNDK18☆10Updated 4 years ago
- il2cpp游戏的string类实现char*与std::string的转换和修改☆49Updated 5 years ago