elllusion / pinduoduo_backdoor_codeLinks
拼多多事件的脱壳后的部分代码
☆377Updated 2 years ago
Alternatives and similar repositories for pinduoduo_backdoor_code
Users that are interested in pinduoduo_backdoor_code are comparing it to the libraries listed below
Sorting:
- pinduoduo backdoor☆323Updated 2 years ago
- 拼多多利用漏洞攻击用户手机材料汇总&存证☆243Updated 2 years ago
- Samples and Unpacker of malicious backdoors and exploits developed and used by Pinduoduo☆1,228Updated 2 years ago
- openHarmony逆向工具包,初步支持反编译☆513Updated last month
- ☆549Updated last year
- 基于eBPF的syscall追踪工具,适用于安卓平台☆325Updated 2 years ago
- Android逆向的相关脚本文件☆319Updated 3 years ago
- 脱Apk使用360加固、梆梆加固、腾讯乐固、百度加固免费版加的壳☆433Updated 4 years ago
- 对拼多多app利用0day漏洞控制用户手机及窃取数据的分析,含分析指引☆638Updated 2 years ago
- 曲境是一个xposed模块,可支持在PC浏览器上动态监控(hook)安卓APP的函数调用和查看堆栈信息,及反射调用(invoke)等功能。☆680Updated 2 years ago
- 拼多多apk内嵌提权代码,及动态下发dex分析☆120Updated 2 years ago
- rom逆向工具ui管理☆201Updated 3 years ago
- 基于内存探测的简易脱壳小工具☆180Updated 9 months ago
- An android Dex protection shell implementation☆846Updated last week
- 基于ART主动调用的脱壳机☆758Updated 3 years ago
- ROM逆向工具☆650Updated last year
- ☆239Updated 4 years ago
- 一键反编译工具(不需要手动安装Python) One key for quickly decompile apk/aar/dex/jar, support by jadx/dex2jar/enjarify.☆935Updated last year
- A binder interceptor framework for Android☆365Updated last year
- https://5ec1cff.github.io/my-blog☆335Updated 2 years ago
- 梆梆企业加固详细逆向分析过程, 包含两种对该加固的脱壳机(直接解密classes0.jar和基于frida hook)☆468Updated 6 years ago
- eBPF安全开发、安卓系统与内核定制、Frida源码分析与对抗、沙箱开发等课程🔥☆270Updated last week
- 通过内存特征检测frida☆506Updated 6 years ago
- 如何把签名校验做到极致☆168Updated 5 years ago
- 记录一些我自己在学习Android逆向过程中的有意思的东西☆814Updated 2 years ago
- 基于eBPF的堆栈追踪工具☆1,306Updated 2 weeks ago
- 又一款基于ART的主动调用的脱壳机☆774Updated 4 years ago
- 在FART的基础上进行优化。实现更深的主动调用。适用AOSP10☆259Updated 4 years ago
- Modify Android linker to provide loading module and hook function☆459Updated 2 months ago
- 安卓加固方案☆170Updated 3 years ago