blendin / xsneakLinks
read process memory with process_vm_readv
☆16Updated 5 years ago
Alternatives and similar repositories for xsneak
Users that are interested in xsneak are comparing it to the libraries listed below
Sorting:
- A frida module to parse Elf headers in runtime☆35Updated 6 years ago
- unpack UPX on android.☆35Updated 6 years ago
- rewrite dex file☆42Updated 3 years ago
- Custom linker implemented with Segmentation Fault handler☆21Updated 5 years ago
- substrate framework for android based on frida☆16Updated 5 years ago
- JNI Helper for IDA 7.4+☆42Updated last year
- IDA plugin aid to set android so breakpoint☆33Updated 7 years ago
- anti ollvm like flat/bcf/sub☆73Updated 6 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Updated 5 years ago
- ARM Emulator Developing(interp + jit + aot)☆28Updated 5 years ago
- ☆32Updated 3 years ago
- a poc implementation arm64 tracer based on simulation☆63Updated 4 years ago
- Android-Syscall-Logger☆22Updated 4 years ago
- get android app signature without java api☆35Updated 6 years ago
- IDA Python Script for anti ollvm-arm☆29Updated 3 years ago
- Reverse Engineering about 360 android app guard☆58Updated 5 years ago
- ☆15Updated 4 years ago
- ☆88Updated 4 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆29Updated 5 years ago
- android injext dex☆57Updated 6 years ago
- crypt elf dynstr or rodata section☆18Updated 6 years ago
- Android rootkit☆43Updated 9 years ago
- ☆60Updated 8 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆91Updated 7 years ago
- Like-LeGu☆32Updated last year
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆32Updated last year
- Obfuscated Binaries☆29Updated 2 years ago
- Print Android Binder Data about TRANSACTION☆23Updated 6 years ago
- monitor svc calls of android☆73Updated 6 years ago
- ☆54Updated 7 years ago