maiyao1988 / my_aosp81
A modified android 8.1 for reverse engineer...
☆11Updated 4 years ago
Alternatives and similar repositories for my_aosp81:
Users that are interested in my_aosp81 are comparing it to the libraries listed below
- ☆21Updated 5 years ago
- An Xposed plugin loader without rebooting the phone☆3Updated 3 years ago
- unpack UPX on android.☆35Updated 5 years ago
- deollvm arm64 based unicorn☆36Updated 5 years ago
- Dump and fix the android so file☆39Updated 4 years ago
- Android-Syscall-Logger☆22Updated 4 years ago
- A frida module to parse Elf headers in runtime☆34Updated 5 years ago
- substrate framework for android based on frida☆16Updated 4 years ago
- 一个简易的unicorn tracer,剪裁自项目Rainbow。☆26Updated 4 years ago
- Reverse Engineering about 360 android app guard☆58Updated 5 years ago
- rewrite dex file☆41Updated 3 years ago
- ☆45Updated 6 years ago
- IDA plugin aid to set android so breakpoint☆32Updated 7 years ago
- ARM Emulator Developing(interp + jit + aot)☆28Updated 4 years ago
- Print Android Binder Data about TRANSACTION☆23Updated 6 years ago
- ☆11Updated 5 years ago
- Hook native with xposed☆17Updated 3 years ago
- ida 对抗 花指令, 基于 ida 7.5 sdk 编写☆18Updated last year
- get android app signature without java api☆33Updated 6 years ago
- unicorn demo☆26Updated 4 years ago
- Start method tracing using Android's internal APIs☆12Updated 7 years ago
- ☆54Updated 8 years ago
- 基于Flask框架和frida开发的一款frida server☆12Updated 5 years ago
- jeb Decrypt python script☆20Updated 5 years ago
- 利用android_inject和hookZz框架写的Android zygote注入andorid程序☆37Updated 6 years ago
- ☆31Updated 3 years ago
- A Project for people to study android svc.☆25Updated 2 years ago
- android hide root demo, code from Magisk☆20Updated 6 years ago
- a poc implementation arm64 tracer based on simulation☆54Updated 3 years ago
- OLLVM_Deobfuscation 是一款ollvm反混淆工具,目前已经能完美实现x86架构Linux平台下,被ollvm混淆过的C/C++代码的反混淆,后续将逐步尝试Android SO文件的反混淆☆21Updated 7 years ago