iGio90 / DwarfCore
☆17Updated 9 months ago
Alternatives and similar repositories for DwarfCore:
Users that are interested in DwarfCore are comparing it to the libraries listed below
- ☆13Updated 4 years ago
- A frida module to parse Elf headers in runtime☆32Updated 5 years ago
- ☆21Updated 4 years ago
- rewrite dex file☆41Updated 3 years ago
- Tools for inspecting C++ code and STL objects with Frida☆30Updated 3 years ago
- You can run Android Runtime in Qiling☆26Updated 2 years ago
- ☆29Updated 2 years ago
- substrate framework for android based on frida☆15Updated 4 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆19Updated 5 years ago
- ☆27Updated 2 months ago
- read process memory with process_vm_readv☆16Updated 5 years ago
- anti ollvm like flat/bcf/sub☆73Updated 5 years ago
- Obfuscated Binaries☆29Updated 2 years ago
- JNI Helper for IDA 7.4+☆40Updated 7 months ago
- 蛋蛋模拟器分析附件☆4Updated 3 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆32Updated 8 months ago
- a poc implementation arm64 tracer based on simulation☆54Updated 3 years ago
- A small script to get syscall info from its number (intented to be used with Frida)☆21Updated 3 years ago
- Unicorn emulator plugin for Dwarf☆18Updated 5 years ago
- Utility to read custom structure from Tencent's libshell packer☆38Updated 6 years ago
- Android-Syscall-Logger☆22Updated 4 years ago
- A comprehensive plug-in injection toolset☆26Updated 5 months ago
- unpack UPX on android.☆35Updated 5 years ago
- deollvm arm64 based unicorn☆35Updated 5 years ago
- Hide Module "frida-agent.dll", Only for Windows.☆28Updated last year
- IDA Python Script for anti ollvm-arm☆27Updated 3 years ago
- Update Frida hooks automatically.☆27Updated last year
- Trace jni calls with eBPF on Android☆25Updated 2 years ago
- 使用Unicorn解密Hikari加密过的字符串(觉得好的话给个star呗!)☆48Updated 5 years ago
- Simple Android ARM&ARM64 GOT Hook☆35Updated 2 years ago