linouxis9 / ARMStrong
A fast and simple ARM Simulator made for education based upon Unicorn and Keystone engines
☆121Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ARMStrong
- deobfuse compiler☆213Updated 3 years ago
- Unicorn Emulator Debug Server - Written in Rust, with bindings for C, Go, Java and Python☆353Updated last month
- break ollvm.☆98Updated 3 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago
- hook or replace arbitary linux kernel functions in runtime, supporting arm32, arm64, x86, x86_64☆166Updated last week
- ART tracing research☆88Updated last year
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆225Updated 4 years ago
- android memory access trace utility powered by frida framework☆228Updated 2 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆82Updated 4 months ago
- Automatically de-obfuscate ollvm and generate binaries☆101Updated 2 years ago
- linux kernel inline hook☆112Updated 2 years ago
- 使用Binary Ninja去除ollvm流程平坦混淆☆417Updated 4 years ago
- Instructions tracing powered by frida☆174Updated 5 years ago
- ☆148Updated 4 years ago
- Engine used by jnitrace to intercept JNI API calls.☆313Updated last year
- Trace APIs declaratively through Frida.☆224Updated 10 months ago
- Materials for LIEF tutorials☆142Updated last year
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆330Updated last year
- IDA_Signsrch in Python☆96Updated 4 years ago
- Official Unicorn CPU emulator framework API documentation☆258Updated last year
- Dynamic java method hook for Android,Implemented by jvmti☆9Updated 9 months ago
- 笔者在一款基于LLVM编译器架构的retdec开源反编译器工具的基础上,融合了klee符号执行工具,通过符号执行(Symbolic Execution)引擎动态模拟反编译后的llvm的ir(中间指令集)运行源程序的方法,插桩所有的对x86指令集的thiscall类型函数对t…☆210Updated 2 years ago
- You can run Android Runtime in Qiling☆25Updated 2 years ago
- PLCT实验室维护的ollvm分支。原始代码来自于 https://github.com/obfuscator-llvm/obfuscator 移植到了最新的 LLVM 上。☆165Updated last year
- 帮助逆向者使用ida便利地调试apk so文件,抛开调试前的那些麻烦步骤☆43Updated 2 years ago
- ☆405Updated 3 years ago
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆164Updated 2 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆140Updated 5 months ago
- ☆120Updated 4 years ago
- Common IDA scripts for effective Reverse Enginnering☆157Updated last year