flankerhqd / jebmcpLinks
☆144Updated last month
Alternatives and similar repositories for jebmcp
Users that are interested in jebmcp are comparing it to the libraries listed below
Sorting:
- ☆127Updated last week
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆96Updated last year
- 010Editor template for .abc (Open/HarmonyOS Ark Bytecode) files☆41Updated last year
- ☆119Updated 7 years ago
- Code Scanner For Android Privacy☆38Updated 2 years ago
- Open/HarmonyOS abc file parser and decompiler☆112Updated last month
- 0x401 Team二进制方向逆向辅助分析工具专题培训☆80Updated 3 years ago
- fla反混淆☆48Updated 2 months ago
- 自己收集与编写的常用IDA脚本,通常用于反混淆☆87Updated 7 months ago
- PendingIntent exploit☆11Updated 2 years ago
- Instruction tracer powered by Frida☆140Updated 4 months ago
- a panda executable file decompiler of HarmonyOS Next(鸿蒙反编译器)☆117Updated 2 months ago
- 移动安全相关的一些面经和知识整理☆25Updated 4 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Updated 2 years ago
- smali trace☆185Updated 3 years ago
- blabla☆49Updated 4 years ago
- Muti-threading version of Finger☆32Updated last year
- ☆55Updated 10 months ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆189Updated last year
- a deflat script using unicorn engine☆42Updated 3 years ago
- r0idamcp is a SSE protocal MCP server IDA pro plugin designed for automatic reverse engineering with LLM assistant☆64Updated 5 months ago
- a demo poc for CVE-2024-0015☆18Updated last year
- D-810 is an IDA Pro plugin which can be used to deobfuscate code at decompilation time by modifying IDA Pro microcode.☆61Updated 4 years ago
- ☆17Updated last year
- Use angr to deflat the flat control flow.☆24Updated 6 years ago
- ☆12Updated 3 years ago
- 这是一个基于aosp 刷机的笔记 使用设备 pixel4a☆33Updated 2 years ago
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆206Updated 5 months ago
- 木鱼安卓APP分析沙箱☆78Updated 2 years ago
- 梆梆加固反调试和root☆87Updated 3 years ago