dukeify / fake-jniLinks
An implementation of the JNI and JVMTI with support for direct interaction between natively registered classes and JVM objects.
☆31Updated 4 years ago
Alternatives and similar repositories for fake-jni
Users that are interested in fake-jni are comparing it to the libraries listed below
Sorting:
- JNI Helper for IDA 7.4+☆42Updated 10 months ago
- A deobfuscation plugin for IDA☆63Updated 2 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Updated 5 years ago
- rewrite dex file☆42Updated 3 years ago
- deollvm arm64 based unicorn☆36Updated 5 years ago
- ☆35Updated 6 years ago
- android hide root demo, code from Magisk☆20Updated 6 years ago
- android应用反调试以及反内存dump代码收集☆31Updated 9 years ago
- break ollvm.☆104Updated last month
- A frida module to parse Elf headers in runtime☆35Updated 5 years ago
- Control flow obfuscation for Java code☆12Updated 3 years ago
- Utility to read custom structure from Tencent's libshell packer☆38Updated 6 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Updated 2 years ago
- ARM and x86 hooking framework for love live school idol festival EN and JP☆24Updated 6 years ago
- get android app signature without java api☆34Updated 6 years ago
- IDA Python Script for anti ollvm-arm☆27Updated 3 years ago
- Hide Module "frida-agent.dll", Only for Windows.☆28Updated last year
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆29Updated 5 years ago
- unpack UPX on android.☆35Updated 6 years ago
- JNI Helper Plugin☆53Updated 6 months ago
- based on llvm 5.0.1 release with ollvm☆37Updated 7 years ago
- ☆18Updated 3 years ago
- An Xposed plugin loader without rebooting the phone☆3Updated 3 years ago
- read process memory with process_vm_readv☆16Updated 5 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆89Updated 7 years ago
- A fork of Hikari's core obfuscation☆72Updated 4 years ago
- Obfuscated Binaries☆29Updated 2 years ago
- ☆13Updated 4 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆70Updated 5 years ago
- Alternative Unicorn bindings because the original did not work and I don't know F#.☆14Updated last year