extremecoders-re / ghidra-jniLinks
jni.h compiled for Ghidra
☆92Updated 5 years ago
Alternatives and similar repositories for ghidra-jni
Users that are interested in ghidra-jni are comparing it to the libraries listed below
Sorting:
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆36Updated 3 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆358Updated 2 years ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆176Updated last year
- MODeflattener deobfuscates control flow flattened functions obfuscated by OLLVM using Miasm.☆202Updated 4 years ago
- A place to reborn☆60Updated 3 years ago
- Frida hook generator for Ghidra☆128Updated 4 months ago
- ☆85Updated last year
- Hex-Rays OLLVM Deobfuscator and MicroCode Explorer☆178Updated 5 years ago
- Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBA☆196Updated 2 years ago
- Plugins for reversing android apps in JEB☆78Updated last year
- DroidGuard VM Samples☆67Updated 3 years ago
- A Rust crate to load a shared library into a Linux process without using ptrace.☆144Updated 2 years ago
- IDA Pro plugin for reconstructing original .proto files from binary.☆298Updated 7 months ago
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆172Updated 3 years ago
- ☆59Updated 2 years ago
- Instructions tracing powered by frida☆182Updated 6 years ago
- Tool aimed to provide a binary analysis of different file formats through the use of an Intermmediate Representation.☆144Updated last year
- My own collection of Frida scripts and tricks☆69Updated 4 years ago
- Taint Analysis Engine and Trace Exploration : Overcome Obfuscation☆52Updated 3 months ago
- ☆65Updated 5 months ago
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆82Updated last year
- Deobfuscate OLLVM Bogus Control Flow via angr☆68Updated 4 years ago
- An IDA plugin that eases reversing of binaries that have been code-size-optimized with function outlining☆223Updated last year
- Android kernel exploitation for CVE-2022-20409☆200Updated last year
- Files used to resolve the r2pay challenge☆55Updated 5 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆164Updated 5 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆69Updated 6 years ago
- CVE-2025-21479 proof-of-concept, I think☆193Updated 5 months ago
- ☆30Updated 5 years ago
- Binary ninja plugin for python compiled bytecode (pyc) disassembly☆32Updated last year