kp7742 / ida-actionsLinks
GitHub Actions to analyse file using IDA
☆30Updated 6 months ago
Alternatives and similar repositories for ida-actions
Users that are interested in ida-actions are comparing it to the libraries listed below
Sorting:
- A rootkit for Android.☆54Updated last year
- 去除BR混淆 Deobfuscation BR☆74Updated 11 months ago
- Android assembly instruction tracing tool☆17Updated last month
- 使用 frida stalker 实现的 trace☆27Updated 2 years ago
- 研究内核改机策略☆59Updated last year
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆51Updated last year
- tprt ollvm 反混淆 修改 binja il☆41Updated 9 months ago
- A zygisk module that dumps so file from process memory☆72Updated 7 months ago
- Single-step debugging of native code using frida, stalker, and semaphore☆77Updated 7 months ago
- hwBreakpoint Test App☆19Updated 2 years ago
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆17Updated 2 months ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆16Updated last year
- ☆27Updated 4 months ago
- ☆17Updated last year
- ☆57Updated 3 years ago
- A program to read and modify the memory of other processes.☆17Updated 2 years ago
- deobfuscation BR☆46Updated last year
- ☆21Updated 3 weeks ago
- 反ida内联汇编花指令☆50Updated last year
- vm 还原的分享☆66Updated 8 months ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆58Updated 6 months ago
- with this repo you can bypass libpairipcore tamper and signature protection☆39Updated last month
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- 自實現Linker的小Demo☆67Updated 11 months ago
- IDA plugin which queries Local language models to speed up reverse-engineering☆22Updated last year
- llvm with customised obfuscation optimisations☆14Updated 8 months ago
- ☆35Updated 5 months ago
- fla反混淆☆28Updated last month
- ☆67Updated 3 months ago
- Inotify监听测试☆34Updated 3 years ago