narayanpai1 / Signal-Protocol-ImplementationLinks
☆11Updated 4 years ago
Alternatives and similar repositories for Signal-Protocol-Implementation
Users that are interested in Signal-Protocol-Implementation are comparing it to the libraries listed below
Sorting:
- Frida scripts to bypass Arxan protection on Boom Beach plus some mods.☆25Updated 2 years ago
- ☆284Updated 2 years ago
- eBPF-based lightweight debugger for Android☆717Updated 5 months ago
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆224Updated 7 months ago
- ☆93Updated 6 months ago
- ollvm, base on llvm-clang 18.x☆79Updated last year
- android memory access trace utility powered by frida framework☆246Updated 3 years ago
- ☆371Updated last year
- ☆62Updated last year
- Non-authoritatively making Frida less (not un-!)detectable by applying some symptomatic patches. Melded with CrackerCat/strongR-frida-and…☆176Updated this week
- eBPF-Based DexDumper for Android☆332Updated 2 weeks ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆172Updated 11 months ago
- A simple Clash Royale proxy☆11Updated 7 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆194Updated last year
- modified HarmonyOS Next emulator,with root permission☆136Updated last year
- Unreal Engine 4 Dumper - Dump libUE4.so and Generate Structure SDK☆53Updated 2 years ago
- ☆162Updated 5 years ago
- this is frida trace assemble and register change tools☆169Updated 2 years ago
- 劫持Zygote在App启动前注入so☆340Updated last year
- 在FART的基础上进行优化。实现更深的主动调用。适用AOSP10☆258Updated 4 years ago
- Java runtime interop from Frida☆392Updated 2 months ago
- Instruction tracer powered by Frida☆153Updated 6 months ago
- 针对 @hanbinglengyue 的FART项目下的Frida脱壳脚本进行最新适配,可在Frida16.1.0 + Android12环境下进行脱壳☆253Updated last year
- Use binaryninja workflow to deflat ollvm cff☆27Updated 7 months ago
- strongR-frida☆220Updated 4 years ago
- A Model Context Protocol server for IDA☆500Updated 6 months ago
- 基于eBPF的syscall追踪工具,适用于安卓平台☆325Updated 2 years ago
- ☆128Updated last year
- Experiments on the feasibility of Flutter application reverse engineering☆167Updated 2 years ago
- ☆611Updated 2 years ago