junknet / adbg_gui_x64
adbg_x64
☆14Updated 2 years ago
Alternatives and similar repositories for adbg_gui_x64:
Users that are interested in adbg_gui_x64 are comparing it to the libraries listed below
- 内核硬件调试器模块,rootkit操作 dump☆34Updated 2 years ago
- A simple android utility for inject so (suport arm, aarch64)☆24Updated last year
- Obfuscated Binaries☆28Updated last year
- zygisk插件:用于unity游戏hook☆15Updated 2 years ago
- ☆15Updated 3 years ago
- 使用 frida stalker 实现的 trace☆24Updated 2 years ago
- deobfuscation BR☆38Updated 10 months ago
- Resolve calls for internal unity engine functions☆19Updated 5 years ago
- IDA Python Script for anti ollvm-arm☆27Updated 3 years ago
- obpo backend server written by golang☆32Updated last year
- A rootkit for Android.☆47Updated 7 months ago
- Android So Fix☆23Updated 6 years ago
- ida 对抗 花指令, 基于 ida 7.5 sdk 编写☆17Updated 11 months ago
- Getting better stacks and backtraces in Frida☆34Updated 6 months ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆42Updated 7 months ago
- ☆14Updated last year
- tprt ollvm 反混淆 修改 binja il☆35Updated 4 months ago
- 本工具用于解决ollvm编译出来的Linux驱动文件,加载进内核会报错“please compile with -fno-common”的问题☆30Updated 3 years ago
- deollvm arm64 based unicorn☆35Updated 5 years ago
- A zygisk module that dumps so file from process memory☆46Updated 3 months ago
- IDA plugin which queries Local language models to speed up reverse-engineering☆19Updated 8 months ago
- A program to read and modify the memory of other processes.☆16Updated last year
- ☆29Updated 2 years ago
- linux x86_64 and arm64 syscall hook☆18Updated last year
- 反ida内联汇编花指令☆49Updated last year
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆31Updated 6 months ago
- 反反frida调试☆23Updated last year
- Inotify监听测试☆32Updated 2 years ago