bloomu-prof / Arm64-Simulator
Simulator/interpreter for Arm64 machine language
☆12Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Arm64-Simulator
- Android-Syscall-Logger☆18Updated 3 years ago
- substrate framework for android based on frida☆15Updated 4 years ago
- 蛋蛋模拟器分析附件☆4Updated 2 years ago
- 利用angr去除ollvm的虚假控制流☆12Updated 3 years ago
- Trace jni calls with eBPF on Android☆24Updated 2 years ago
- Custom linker implemented with Segmentation Fault handler☆19Updated 4 years ago
- Trace function calls using lldb☆11Updated 3 years ago
- ☆29Updated 2 years ago
- 白盒CLEFIA加密算法☆14Updated 8 years ago
- read process memory with process_vm_readv☆17Updated 4 years ago
- ☆15Updated 3 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆28Updated 3 months ago
- A frida module to parse Elf headers in runtime☆31Updated 5 years ago
- deollvm arm64 based unicorn☆34Updated 5 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment.☆37Updated 9 months ago
- ☆13Updated 4 years ago
- ida 对抗 花指令, 基于 ida 7.5 sdk 编写☆17Updated 9 months ago
- 详细说明及演示MMU相关原理及过程(用于理解Linux内核Root Kernelpatch)☆20Updated 4 months ago
- ARM64 Assembly Code and Memory Simulator☆24Updated 6 months ago
- An Xposed plugin loader without rebooting the phone☆3Updated 2 years ago
- deobfuscation BR☆35Updated 8 months ago
- 修改Opcode有关,写入map文件时函数末尾数据暂时有问题☆15Updated 6 years ago
- search all symbal in ELF file(dlsym can not find)☆27Updated 5 years ago
- Start method tracing using Android's internal APIs☆11Updated 6 years ago
- Trace Log Generation (CLI) on a target device or emulator : Generating context information of every instruction from a specific point (in…☆21Updated 7 years ago
- deobf tx libtprt's obfuscation☆33Updated 2 months ago
- Format the tcg log for qemu and present it in a more intuitive form☆12Updated last year
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆16Updated 4 years ago