kabeor / REVERSELinks
逆向之路
☆13Updated 6 years ago
Alternatives and similar repositories for REVERSE
Users that are interested in REVERSE are comparing it to the libraries listed below
Sorting:
- ☆32Updated 4 years ago
- ☆55Updated 2 years ago
- ☆57Updated 4 years ago
- 《Android设备指纹攻防&风险环境检测》资料☆72Updated 2 weeks ago
- arm汇编学习_linker学习笔记_Android逆向学习笔记☆140Updated last year
- smali trace☆194Updated 3 years ago
- 个人专用 ONEPLUS 5 内核,做了一些基础的反调试修改(从 maps 隐藏特定 lib,最完整最正常的 tracerPid 修改措施)☆81Updated 4 years ago
- 基于 frida 可监控 native 方法调用☆68Updated 2 years ago
- 小猿口算unidbg生成sign,提供http api服务☆31Updated last year
- ☆58Updated last year
- Reverse libsgmain 聚安全sgmain逆向☆114Updated 5 years ago
- fla反混淆☆52Updated 3 months ago
- ☆123Updated 5 years ago
- unidbg支持Android arm32 多线程☆71Updated 4 years ago
- ☆122Updated 2 years ago
- ☆25Updated 4 years ago
- You can run Android Runtime in Qiling☆29Updated 3 years ago
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆222Updated 7 months ago
- fart修复脚本☆44Updated 4 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆59Updated 3 years ago
- ☆45Updated last year
- 自己使用的unidbg☆26Updated 5 years ago
- Common IDA scripts for effective Reverse Enginnering☆172Updated 2 years ago
- ☆68Updated 2 years ago
- IDA Python Script for anti ollvm☆106Updated 4 years ago
- 用于过滤java层的加密算法☆109Updated 4 years ago
- 使用 Frida Stalker 反 OLLVM 算法还原(函数调用分析、参数分析、打印调用堆栈、指令&寄存器Trace)。 Using Frida Stalker to Bypass OLLVM and Restore (Function Call Analysis, …☆60Updated 2 months ago
- 安卓绕过ptrace反调试☆70Updated 4 years ago
- 一个简易的unicorn tracer,剪裁自项目Rainbow。☆28Updated 4 years ago
- ☆121Updated 3 years ago