maoabc / fuckPxxVM
转换Pxx的vmp文件(check.bin, mw.bin)到.class
☆26Updated last year
Related projects: ⓘ
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆37Updated last year
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆84Updated 7 months ago
- This is a tool used to inject so to any app by ptrace.☆64Updated last year
- ☆23Updated this week
- 2023 年 羊城杯 ezAndroid dex VMP 恢复工具☆33Updated 9 months ago
- 关于Magisk生态的研究☆98Updated 4 months ago
- 魔改sandhook特征,MikRom注入dex实现免root的xposed案例☆34Updated 2 years ago
- ☆18Updated this week
- apatch kpm 模块通用内核读写内存 linux kernel read only support ARM64(based apatch)☆49Updated this week
- run java method of Android in Jadx without Android device.☆55Updated last year
- ☆30Updated 5 months ago
- 修改app包名,实现随机包名,☆38Updated 2 years ago
- ☆24Updated 2 months ago
- Detect Frida Android☆41Updated 2 years ago
- Inotify监听测试☆29Updated 2 years ago
- frida runtime resolves smali☆63Updated last month
- 注入so使用dobby的demo☆17Updated 2 years ago
- dump dex for android 14☆21Updated 2 months ago
- this is Android Custom Linker by Android12 LinkerSourcesCode☆30Updated 5 months ago
- 一个基于ptrace-seccomp简单的重定向openat的demo☆58Updated last year
- ☆37Updated 4 months ago
- learn the sandhook how to work☆21Updated last year
- Root takeover via signature spoofing in KernelSU☆14Updated 11 months ago
- ☆15Updated 2 years ago
- A Project for people to study android svc.☆24Updated 2 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆59Updated this week
- a panda executable file decompiler of HarmonyOS Next☆46Updated this week
- 研究内核改机策略☆45Updated 6 months ago
- 用于练手的环境检测的demo☆66Updated 8 months ago
- 获取更详细的Java调用栈,即使清除调试信息并混淆也能知道那个方法报错☆12Updated 3 months ago