elllusion / pinduoduo_backdoor_code
拼多多事件的脱壳后的部分代码
☆367Updated last year
Related projects ⓘ
Alternatives and complementary repositories for pinduoduo_backdoor_code
- 拼多多利用漏洞攻击用户手机材料汇总&存证☆225Updated last year
- pinduoduo backdoor☆273Updated last year
- Samples and Unpacker of malicious backdoors and exploits developed and used by Pinduoduo☆1,196Updated last year
- ☆288Updated 2 months ago
- A binder interceptor framework for Android☆287Updated 4 months ago
- 基于eBPF的syscall追踪工具,适用于安卓平台☆314Updated last year
- openHarmony逆向工具包☆316Updated last week
- 对拼多多app利用0day漏洞控制用户手机及窃取数据的分析,含分析指引☆502Updated last year
- 拼多多apk内嵌提权代码,及动态下发dex分析☆119Updated last year
- 脱Apk使用360加固、梆梆加固、腾讯乐固、百度加固免费版加的壳☆387Updated 3 years ago
- 基于ART主动调用的脱壳机☆671Updated 2 years ago
- An android Dex protects shell implementation☆571Updated this week
- 基于eBPF的堆栈追踪工具☆924Updated last month
- Android逆向的相关脚本文件☆277Updated last year
- 快速搭建aosp(Android源码)的开发环境☆98Updated 2 years ago
- 无限期停更,请移步 https://5ec1cff.github.io/my-blog☆278Updated last year
- 通过内存特征检测frida☆466Updated 5 years ago
- Frida持久化解决方案☆365Updated 2 years ago
- ROM逆向工具☆587Updated 8 months ago
- 一键反编译工具(不需要手动安装Python) One key for quickly decompile apk/aar/dex/jar, support by jadx/dex2jar/enjarify.☆879Updated 5 months ago
- 曲境是一个xposed模块,可支持在PC浏览器上动态监控(hook)安卓APP的函数调用和查看堆栈信息,及反射调用(invoke)等功能。☆652Updated last year
- ☆238Updated 3 years ago
- 基于frida的安卓hook框架,提供了很多frida自身不支持的功能,将hook安卓变成简单便捷,人人都会的事情☆850Updated last year
- 拼多多apk内嵌提权代码,及动态下发dex分析☆63Updated last year
- [Deprecated] Check whether your xposed has been enabled.☆285Updated 4 years ago
- apk文件加固特征检查工具,汇总收集已知特征和手动收集大家提交的app加固特征,目前总计约170条特征,支持40个厂商的加固检测,欢迎大家提交无法识别的app☆453Updated 2 months ago
- rom逆向工具ui管理☆187Updated 2 years ago
- 基于xposed的frida持久化方案☆317Updated 3 years ago
- 记录一些我自己在学习Android逆向过程中的有意思的东西☆779Updated last year