codetronik / CodeLabyrinthLinks
LLVM Obfuscation Pass
☆22Updated 10 months ago
Alternatives and similar repositories for CodeLabyrinth
Users that are interested in CodeLabyrinth are comparing it to the libraries listed below
Sorting:
- A WIP Obfuscator based on llvm14☆32Updated 2 years ago
- A simple android utility for inject so (suport arm, aarch64)☆27Updated 2 years ago
- ☆59Updated 3 years ago
- tprt ollvm 反混淆 修改 binja il☆47Updated last year
- GitHub Actions to analyse file using IDA☆30Updated 11 months ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆146Updated last year
- Android Anti Root Detection☆21Updated 3 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆31Updated last year
- Android AntiCheat☆46Updated 3 years ago
- ☆41Updated 3 months ago
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆86Updated 6 months ago
- Independent hikari☆30Updated last year
- Resolve calls for internal unity engine functions☆18Updated 6 years ago
- deobf tx libtprt's obfuscation☆49Updated last year
- 内核硬件调试器模块,rootkit操作 dump☆34Updated 3 years ago
- ☆55Updated last year
- 去除BR混淆 Deobfuscation BR☆80Updated last year
- deobfuscation BR☆52Updated last year
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆39Updated last year
- 使用 frida stalker 实现的 trace☆29Updated 2 years ago
- linux x86_64 and arm64 syscall hook☆21Updated last year
- A rootkit for Android.☆54Updated last year
- 本工具用于解决ollvm编译出来的Linux驱动文件,加载进内核会报错“please compile with -fno-common”的问题☆37Updated 4 years ago
- Injecting into SELinux-protected system service processes under root on Android.☆46Updated last year
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆64Updated 11 months ago
- zygisk插件:用于unity游戏hook☆19Updated 2 years ago
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆70Updated last year
- TypeScript and Frida UE4dumper. Use C++ to get offset. Modular and easy to maintain☆36Updated last year
- ☆71Updated 2 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆82Updated last year