fourbrother / AndroidExtractMethodInfoApk
Android中通过抽取类方法指令信息的加固方案
☆9Updated 6 years ago
Related projects: ⓘ
- 利用android_inject和hookZz框架写的一个Android zygote注入andorid程序,进行中☆11Updated 6 years ago
- 动态加载Xposed模块☆28Updated 3 years ago
- ☆24Updated 4 years ago
- 修复AndroidManifest.xml☆32Updated 8 years ago
- 基于Xposed Hook敏感API☆12Updated 2 years ago
- demo万能模板☆10Updated 5 years ago
- getSharedPreferences的 MODE_WORLD_READABLE 在7.0以上会闪退,所以用contentprovider去替换。这里只提供出具体的两个实现类,根据自己的业务看着改吧。☆19Updated 4 years ago
- Android ask repacked detect.☆13Updated 3 years ago
- An Xposed plugin loader without rebooting the phone☆3Updated 2 years ago
- 风控、实时计算、技术框架、架构方案、Groovy规则引擎、规则决策☆9Updated 5 years ago
- testabstract☆10Updated 4 years ago
- 基于Frida的脱壳工具☆12Updated 6 years ago
- hook ime,进行键盘记录or输入控制,发挥你的想象.....☆38Updated 6 years ago
- some frida script☆10Updated 5 years ago
- 类太极☆30Updated 4 years ago
- ☆16Updated this week
- JNI开发,C加密和视频等☆13Updated 2 years ago
- 解析微信小程序包☆15Updated 6 years ago
- Android-Syscall-Logger☆18Updated 3 years ago
- ☆23Updated 3 years ago
- smali破解代码库☆16Updated 8 years ago
- 利用android_inject和hookZz框架写的Android zygote注入andorid程序☆37Updated 5 years ago
- 7种反调试的方法的实现☆27Updated 7 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆15Updated 5 years ago
- ☆35Updated 7 years ago
- android 10 以上隐式获取设备,对抗黑产☆38Updated 2 years ago
- Trace jni calls with eBPF on Android☆24Updated 2 years ago
- OLLVM_Deobfuscation 是一款ollvm反混淆工具,目前已经能完美实现x86架构Linux平台下,被ollvm混淆过的C/C++代码的反混淆,后续将逐步尝试Android SO文件的反混淆☆20Updated 7 years ago
- ELF 加固,暂时支持dalvik模式☆45Updated 6 years ago
- frida_hook_dlopen☆12Updated 4 years ago