extremecoders-re / ghidra-jniLinks
jni.h compiled for Ghidra
☆90Updated 5 years ago
Alternatives and similar repositories for ghidra-jni
Users that are interested in ghidra-jni are comparing it to the libraries listed below
Sorting:
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆35Updated 3 years ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆172Updated 11 months ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆358Updated 2 years ago
- ☆83Updated last year
- MODeflattener deobfuscates control flow flattened functions obfuscated by OLLVM using Miasm.☆198Updated 4 years ago
- Plugins for reversing android apps in JEB☆77Updated last year
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆172Updated 3 years ago
- Frida hook generator for Ghidra☆126Updated 3 months ago
- A place to reborn☆60Updated 3 years ago
- An IDA plugin that eases reversing of binaries that have been code-size-optimized with function outlining☆223Updated 11 months ago
- DroidGuard VM Samples☆66Updated 3 years ago
- A Rust crate to load a shared library into a Linux process without using ptrace.☆144Updated 2 years ago
- ☆57Updated 2 years ago
- Instructions tracing powered by frida☆182Updated 6 years ago
- IDA Pro plugin for reconstructing original .proto files from binary.☆296Updated 6 months ago
- Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBA☆175Updated 2 years ago
- Binary ninja plugin for python compiled bytecode (pyc) disassembly☆31Updated last year
- Taint Analysis Engine and Trace Exploration : Overcome Obfuscation☆51Updated 2 months ago
- Hex-Rays OLLVM Deobfuscator and MicroCode Explorer☆176Updated 5 years ago
- Android kernel exploitation for CVE-2022-20409☆198Updated last year
- CVE-2025-21479 proof-of-concept, I think☆181Updated 4 months ago
- Tool aimed to provide a binary analysis of different file formats through the use of an Intermmediate Representation.☆144Updated last year
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆80Updated last year
- ☆64Updated 4 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆92Updated last year
- My own collection of Frida scripts and tricks☆69Updated 4 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆159Updated 2 years ago
- Deobfuscate OLLVM Bogus Control Flow via angr☆68Updated 4 years ago
- IDA Pro Docker Image☆103Updated last month
- IDA Domain API - Python interface for IDA Pro reverse engineering platform☆217Updated last week