extremecoders-re / ghidra-jni
jni.h compiled for Ghidra
☆77Updated 5 years ago
Alternatives and similar repositories for ghidra-jni:
Users that are interested in ghidra-jni are comparing it to the libraries listed below
- Deobfuscate OLLVM Bogus Control Flow via angr☆62Updated 3 years ago
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆166Updated 2 years ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆73Updated last month
- MODeflattener deobfuscates control flow flattened functions obfuscated by OLLVM using Miasm.☆169Updated 3 years ago
- Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBA☆123Updated last year
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆31Updated 2 years ago
- Files used to resolve the r2pay challenge☆50Updated 4 years ago
- Binary ninja plugin for python compiled bytecode (pyc) disassembly☆29Updated last year
- ☆59Updated 5 months ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆339Updated last year
- ☆50Updated last year
- My own collection of Frida scripts and tricks☆67Updated 3 years ago
- Instructions tracing powered by frida☆178Updated 5 years ago
- Frida hook generator for Ghidra☆114Updated last month
- Plugins for reversing android apps in JEB☆67Updated 4 months ago
- ☆47Updated 7 months ago
- A IDA plugin to show ARM MSRs nicely☆83Updated 2 years ago
- Symbol Recovery Tool for Nuitka Binaries☆51Updated 2 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆86Updated 10 months ago
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆80Updated 2 years ago
- you can use frida in jeb !☆46Updated 2 years ago
- ☆113Updated last year
- An IDA plugin that eases reversing of binaries that have been code-size-optimized with function outlining☆200Updated 2 months ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆61Updated 2 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆66Updated 5 years ago
- break ollvm.☆99Updated 4 years ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆127Updated 10 months ago
- A Rust crate to load a shared library into a Linux process without using ptrace.☆133Updated last year
- Find crypto constants IDA 7.x plugin☆116Updated 2 years ago
- Traces syscalls on iOS via Frida, including Mach syscalls☆67Updated 10 months ago