extremecoders-re / ghidra-jniLinks
jni.h compiled for Ghidra
☆88Updated 5 years ago
Alternatives and similar repositories for ghidra-jni
Users that are interested in ghidra-jni are comparing it to the libraries listed below
Sorting:
- ☆81Updated last year
- Frida hook generator for Ghidra☆124Updated 2 months ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆354Updated 2 years ago
- ☆58Updated 2 years ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆162Updated 9 months ago
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆35Updated 3 years ago
- IDA Pro Docker Image☆101Updated 3 months ago
- Hex-Rays OLLVM Deobfuscator and MicroCode Explorer☆173Updated 5 years ago
- CVE-2025-21479 proof-of-concept, I think☆168Updated 3 months ago
- Plugins for reversing android apps in JEB☆77Updated last year
- Instructions tracing powered by frida☆180Updated 6 years ago
- ☆124Updated 2 years ago
- ☆60Updated 2 months ago
- IDA Pro plugin for reconstructing original .proto files from binary.☆293Updated 4 months ago
- Tool aimed to provide a binary analysis of different file formats through the use of an Intermmediate Representation.☆144Updated last year
- you can use frida in jeb !☆45Updated 3 years ago
- A place to reborn☆59Updated 3 years ago
- Taint Analysis Engine and Trace Exploration : Overcome Obfuscation☆47Updated 3 weeks ago
- MODeflattener deobfuscates control flow flattened functions obfuscated by OLLVM using Miasm.☆194Updated 4 years ago
- DroidGuard VM Samples☆64Updated 3 years ago
- Binary ninja plugin for python compiled bytecode (pyc) disassembly☆31Updated last year
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆171Updated 3 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆150Updated last year
- A Rust crate to load a shared library into a Linux process without using ptrace.☆141Updated 2 years ago
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆75Updated last year
- Everything you need to build and run Linux and Android kernels for exploit development☆97Updated last year
- ☆42Updated 4 months ago
- ☆30Updated 5 years ago
- My own collection of Frida scripts and tricks☆68Updated 4 years ago
- Deobfuscate OLLVM Bogus Control Flow via angr☆67Updated 3 years ago