linouxis9 / ARMStrong
A fast and simple ARM Simulator made for education based upon Unicorn and Keystone engines
☆122Updated last year
Alternatives and similar repositories for ARMStrong:
Users that are interested in ARMStrong are comparing it to the libraries listed below
- deobfuse compiler☆214Updated 4 years ago
- Unicorn Emulator Debug Server - Written in Rust, with bindings for C, Go, Java and Python☆360Updated last month
- break ollvm.☆99Updated 4 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago
- ART tracing research☆88Updated 2 years ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆228Updated 4 years ago
- Official Unicorn CPU emulator framework API documentation☆262Updated 2 years ago
- hook or replace arbitary linux kernel functions in runtime, supporting arm32, arm64, x86, x86_64☆179Updated last month
- ☆153Updated 5 years ago
- Common IDA scripts for effective Reverse Enginnering☆166Updated 2 years ago
- translator from dex bytecode into LLVM ir☆53Updated 2 years ago
- Automatically de-obfuscate ollvm and generate binaries☆106Updated 3 years ago
- 逆向聚安全litevm相关☆53Updated 4 years ago
- android memory access trace utility powered by frida framework☆234Updated 2 years ago
- 破解聚安全无线保镖sgavmp相关框架☆126Updated 4 years ago
- deobfuscator llvm arm64 script☆88Updated 5 years ago
- 使用Binary Ninja去除ollvm流程平坦混淆☆419Updated 5 years ago
- A step-by-step tutorial for building an LLVM sample pass☆193Updated 2 years ago
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆166Updated 2 years ago
- Materials for LIEF tutorials☆146Updated last year
- framenthook☆63Updated 5 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆88Updated 7 years ago
- ☆121Updated 5 years ago
- Syscall table hook frame in Android kernel for arm and arm64☆81Updated 7 years ago
- PLCT实验室维护的ollvm分支。原始代码来自于 https://github.com/obfuscator-llvm/obfuscator 移植到了最新的 LLVM 上。☆167Updated 2 years ago
- 笔者在一款基于LLVM编译器架构的retdec开源反编译器工具的基础上,融合了klee符号执行工具,通过符号执行(Symbolic Execution)引擎动态模拟反编译后的llvm的ir(中间指令集)运行源程序的方法,插桩所有的对x86指令集的thiscall类型函数对t…☆218Updated 2 years ago
- smali trace☆158Updated 2 years ago
- linux kernel inline hook☆122Updated 2 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆88Updated 7 months ago
- Python3 useful scripts.☆34Updated 4 years ago