flankerhqd / jebmcpLinks
☆143Updated last month
Alternatives and similar repositories for jebmcp
Users that are interested in jebmcp are comparing it to the libraries listed below
Sorting:
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆96Updated last year
- ☆125Updated last week
- ☆120Updated 7 years ago
- 移动安全相关的一些面经和知识整理☆26Updated 4 years ago
- 0x401 Team二进制方向逆向辅助分析工具专题培训☆81Updated 3 years ago
- ☆55Updated 9 months ago
- 010Editor template for .abc (Open/HarmonyOS Ark Bytecode) files☆41Updated last year
- 自己收集与编写的常用IDA脚本,通常用于反混淆☆85Updated 7 months ago
- Code Scanner For Android Privacy☆38Updated 2 years ago
- smali trace☆184Updated 3 years ago
- Use angr to deflat the flat control flow.☆24Updated 6 years ago
- Open/HarmonyOS abc file parser and decompiler☆107Updated last month
- Instruction tracer powered by Frida☆139Updated 3 months ago
- a deflat script using unicorn engine☆43Updated 2 years ago
- blabla☆50Updated 4 years ago
- Muti-threading version of Finger☆31Updated last year
- a demo poc for CVE-2024-0015☆17Updated last year
- PendingIntent exploit☆11Updated 2 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆91Updated 2 years ago
- fla反混淆☆47Updated 2 months ago
- D-810 is an IDA Pro plugin which can be used to deobfuscate code at decompilation time by modifying IDA Pro microcode.☆58Updated 3 years ago
- a panda executable file decompiler of HarmonyOS Next(鸿蒙反编译 器)☆116Updated last month
- 这是一个基于aosp 刷机的笔记 使用设备 pixel4a☆33Updated 2 years ago
- 主要记入自己复现过的android cve☆51Updated 3 years ago
- ☆12Updated 3 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆187Updated last year
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆202Updated 4 months ago
- ☆17Updated last year
- ☆75Updated 3 years ago
- 木鱼安卓APP分析沙箱☆78Updated 2 years ago