amimo / msc2-crackme3
阿里2015第二届安全挑战赛第三题题解
☆23Updated 3 years ago
Alternatives and similar repositories for msc2-crackme3:
Users that are interested in msc2-crackme3 are comparing it to the libraries listed below
- ☆51Updated 6 years ago
- ☆21Updated 4 years ago
- Android So Fix☆25Updated 6 years ago
- unicorn demo☆26Updated 4 years ago
- deollvm arm64 based unicorn☆35Updated 5 years ago
- 使用Unicorn解密Hikari加密过的字符串(觉得好的话给个star呗!)☆48Updated 5 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆27Updated 5 years ago
- 逆向聚安全litevm相关☆53Updated 4 years ago
- elf 函数加密,字符串加密☆47Updated 8 years ago
- ☆87Updated 3 years ago
- IDA plugin aid to set android so breakpoint☆32Updated 7 years ago
- unpack UPX on android.☆35Updated 5 years ago
- ☆53Updated 8 years ago
- ☆59Updated 8 months ago
- ARM Emulator Developing(interp + jit + aot)☆28Updated 4 years ago
- Trace jni calls with eBPF on Android☆25Updated 2 years ago
- Print Android Binder Data about TRANSACTION☆23Updated 5 years ago
- An Xposed plugin loader without rebooting the phone☆3Updated 2 years ago
- ☆22Updated 3 years ago
- JNI Helper Plugin☆52Updated 3 months ago
- 基于openssl实现AES、DES、RSA、MD5、SM3、SM4等加解密和摘要功能☆38Updated 3 years ago
- 利用android_inject和hookZz框架写的Android zygote注入andorid 程序☆37Updated 6 years ago
- Android Injector☆23Updated 8 years ago
- 修复AndroidManifest.xml☆32Updated 9 years ago
- ☆59Updated 8 years ago
- ☆69Updated 6 years ago
- Android-Syscall-Logger☆21Updated 4 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago
- blabla☆49Updated 4 years ago
- 利用android_inject和hookZz框架写的一个Android zygote注入andorid程序,进行中☆12Updated 6 years ago