fvrmatteo / DMNPLinks
Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.
☆88Updated 7 years ago
Alternatives and similar repositories for DMNP
Users that are interested in DMNP are comparing it to the libraries listed below
Sorting:
- ☆88Updated 3 years ago
- Android Library Code Recognition☆80Updated last year
- Frida module to hook module initializations on android☆67Updated 4 years ago
- ☆60Updated 8 years ago
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆167Updated 3 years ago
- rewrite dex file☆41Updated 3 years ago
- Syscall table hook frame in Android kernel for arm and arm64☆82Updated 8 years ago
- Some reverse-engineering scripts☆114Updated 5 years ago
- a universal and automated unpacking system☆43Updated 7 years ago
- unpack UPX on android.☆35Updated 6 years ago
- deobfuscator llvm arm64 script☆92Updated 5 years ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- Reverse Engineering about 360 android app guard☆58Updated 5 years ago
- Shared Library Injector on Android☆149Updated 5 years ago
- JNI Helper Plugin☆53Updated 5 months ago
- break ollvm.☆104Updated last month
- Utility to read custom structure from Tencent's libshell packer☆38Updated 6 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆161Updated 5 years ago
- anti ollvm like flat/bcf/sub☆73Updated 5 years ago
- ☆61Updated 5 years ago
- Android rootkit☆41Updated 9 years ago
- ☆58Updated 10 months ago
- Instructions tracing powered by frida☆178Updated 5 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago
- JNI Helper for IDA 7.4+☆42Updated 9 months ago
- android arm64(aarch64) code inject☆39Updated 10 years ago
- ☆54Updated 7 years ago
- 逆向聚安全litevm相关☆53Updated 4 years ago
- Emulator Native Hooking Framework based on Xposed☆50Updated 6 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago