fourbrother / parse_androidxmlLinks
解析Android中xml文件格式
☆84Updated 8 years ago
Alternatives and similar repositories for parse_androidxml
Users that are interested in parse_androidxml are comparing it to the libraries listed below
Sorting:
- 解析Android中so文件格式☆88Updated 8 years ago
- 解析Android中的dex文件格式☆120Updated 7 years ago
- 解析Android中的arsc文件格式☆82Updated 8 years ago
- Xposed框架Hook案例☆49Updated 8 years ago
- Android安全防护的几种反调试方案策略☆171Updated 8 years ago
- VirtualApp 代码注释☆163Updated 6 years ago
- 自研利用动态加载技术实现APK加壳,壳程序用JNI实现增加源码破解难度。☆96Updated 7 years ago
- .so文件加固☆28Updated 7 years ago
- ☆40Updated 5 years ago
- 《Android应用安全防护和逆向分析》大黄书所有代码资源下载地址☆121Updated 6 years ago
- 学习练手☆84Updated 7 years ago
- Android中锁屏密码算法☆57Updated 7 years ago
- smali文件,jar包字符串混淆,支持gradle插件☆162Updated 7 years ago
- ☆93Updated 7 years ago
- 学习jni及反调试策略☆50Updated 7 years ago
- 基于YAHFA和dexposed 结合的hook框架 支持4.0-7.0☆88Updated 7 years ago
- Xposed框架Hook加固应用的☆199Updated 8 years ago
- 修复apktool打包出现No resource found....☆56Updated 6 years ago
- Android application hooking tool based on FastHook + VirtualApp☆176Updated 6 years ago
- 基于Xposed的极简易的dump dex文件脱壳工具☆53Updated 6 years ago
- CydiaSubstrate框架hook案例☆99Updated 5 years ago
- java代码直接转化成smali代码工具☆166Updated 7 years ago
- 通过Xposed框架hook android的敏感函数,具体参考https://github.com/halfkiss/ZjDroid, 并添加了相应的函数☆72Updated 6 years ago
- apimonitor ZjDroid是基于Xposed Framewrok的动态逆向分析模块,逆向分析者可以通过ZjDroid完成以下工作: DEX文件的内存dump 基于Dalvik关键指针的内存BackSmali,有效破解加固应用 敏感API的动态监控 指定内存区域数…☆56Updated 8 years ago
- ☆128Updated 8 years ago
- Android plugin 插件化框架,支持APK免安装运行☆25Updated 5 years ago
- Android 使用jni校验应用签名sha1值,防止so文件逆向盗用