Common IDA scripts for effective Reverse Enginnering
☆174Feb 15, 2023Updated 3 years ago
Alternatives and similar repositories for IDAScripts
Users that are interested in IDAScripts are comparing it to the libraries listed below
Sorting:
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆232Sep 5, 2020Updated 5 years ago
- deobfuscator llvm arm64 script☆96Oct 17, 2019Updated 6 years ago
- ☆378May 8, 2024Updated last year
- monitor svc calls of android☆74Sep 6, 2018Updated 7 years ago
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆648May 14, 2024Updated last year
- An improved version of AndroidNativeEmu,Allow running android elf on PC☆700Dec 1, 2023Updated 2 years ago
- deobfuse compiler☆215Feb 12, 2021Updated 5 years ago
- 使用Binary Ninja去除ollvm流程平坦混淆☆439Feb 17, 2020Updated 6 years ago
- Seccomp + Signal Intercept SVC☆92Aug 18, 2023Updated 2 years ago
- ☆417Mar 17, 2023Updated 2 years ago
- 破解聚安全无线保镖sgavmp相关框架☆131Jul 13, 2020Updated 5 years ago
- 整理一些unidbg常用的工具在这里☆355Mar 4, 2022Updated 3 years ago
- 一个IDA脚本,可以检测出哈希算法(无论是否魔改常数)并生成frida hook 代码。☆441Jul 14, 2021Updated 4 years ago
- ida 对抗 花指令, 基于 ida 7.5 sdk 编写☆19Jan 22, 2024Updated 2 years ago
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆252Jan 23, 2026Updated last month
- Reverse libsgmain 聚安全sgmain逆向☆116Jun 1, 2020Updated 5 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆87Oct 9, 2024Updated last year
- android memory access trace utility powered by frida framework☆246Apr 2, 2022Updated 3 years ago
- 一个小脚本,用于trace so中native函数的调用。☆569Aug 7, 2021Updated 4 years ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆478Jun 1, 2020Updated 5 years ago
- A Project for people to study android svc.☆25Aug 12, 2022Updated 3 years ago
- An OLLVM-CFF Deobfuscation Plugin☆627Dec 5, 2023Updated 2 years ago
- AntiOllvm Fla with Fake Runtime☆182Jan 8, 2025Updated last year
- 研究内核改机策略☆69Mar 13, 2024Updated last year
- ☆122Nov 24, 2022Updated 3 years ago
- frida runtime resolves smali☆92Jan 24, 2026Updated last month
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆199Jun 15, 2024Updated last year
- 自己收集与编写的常用IDA脚本,通常用于反混淆☆91Feb 28, 2025Updated last year
- ☆958May 7, 2021Updated 4 years ago
- ☆144Jan 10, 2025Updated last year
- Android So文件浏览修复工具☆405Jul 2, 2018Updated 7 years ago
- 使用Unicorn解密Hikari加密过的字符串(觉得好的话给个star呗!)☆56Sep 17, 2019Updated 6 years ago
- 去除BR混淆 Deobfuscation BR☆91Jun 20, 2024Updated last year
- Is a protect Android App anti any attacks and environments.☆356Dec 28, 2023Updated 2 years ago
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆242Feb 22, 2023Updated 3 years ago
- use angr to deobfuscation☆714Sep 18, 2024Updated last year
- IDA plugin, unwind stack trace when debugging arm.☆139Aug 20, 2020Updated 5 years ago
- ☆15Jun 24, 2021Updated 4 years ago
- 通过内存特征检测frida☆512Nov 5, 2019Updated 6 years ago