applicazza / JNIDA
JNI Helper for IDA 7.4+
☆40Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for JNIDA
- read process memory with process_vm_readv☆17Updated 4 years ago
- unpack UPX on android.☆35Updated 5 years ago
- A frida module to parse Elf headers in runtime☆31Updated 5 years ago
- anti ollvm like flat/bcf/sub☆72Updated 5 years ago
- rewrite dex file☆40Updated 2 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆27Updated 4 years ago
- IDA strike-out: A Hex-Rays decompiler plugin to patch the Ctree☆99Updated 2 months ago
- IDA plugin aid to set android so breakpoint☆31Updated 6 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆34Updated last year
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆25Updated 4 years ago
- break ollvm.☆98Updated 3 years ago
- ☆29Updated 2 years ago
- IDA Python Script for anti ollvm-arm☆26Updated 3 years ago
- Like-LeGu☆32Updated 10 months ago
- JNI Helper Plugin☆52Updated 3 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆18Updated 4 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆65Updated 5 years ago
- Binary Ninja plugin to clean up some common obfuscation techniques.☆19Updated 4 years ago
- ☆17Updated 5 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆67Updated 5 years ago
- ☆30Updated 3 years ago
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆164Updated 2 years ago
- ☆35Updated 5 years ago
- IDA Processor for Compiled YARA Rules☆29Updated 5 years ago
- Taint Analysis Engine and Trace Exploration : Overcome Obfuscation☆29Updated 2 weeks ago
- ☆16Updated 5 months ago
- Deobfuscate OLLVM Bogus Control Flow via angr☆62Updated 2 years ago