Android third-party library Detection
☆17Mar 7, 2020Updated 5 years ago
Alternatives and similar repositories for LibRoad
Users that are interested in LibRoad are comparing it to the libraries listed below
Sorting:
- 跟踪objc_msgSend(Track objc_msgSend)☆16Oct 18, 2021Updated 4 years ago
- android got hook under version 5.0☆12Jun 13, 2019Updated 6 years ago
- Simple anti-tamper embedded into a simple string encryption.☆10Mar 7, 2019Updated 6 years ago
- Toolbox to obfuscate Strings in a Swift Project☆14Feb 12, 2026Updated 2 weeks ago
- LibD: Scalable and Precise Third-party Library Detection in Android Markets☆66May 6, 2019Updated 6 years ago
- A modified android 8.1 for reverse engineer...☆11May 16, 2020Updated 5 years ago
- Protect Java Code from Decompilation, beyond Obfuscation☆13Nov 23, 2020Updated 5 years ago
- ☆11Aug 9, 2018Updated 7 years ago
- CrossSim (exploting Cross Project Relationships for Computing Open Source Software Similarity), is an approach that allows us to represen…☆14May 20, 2022Updated 3 years ago
- ☆16Aug 15, 2019Updated 6 years ago
- iOS逆向学习☆20Jul 14, 2021Updated 4 years ago
- Control flow obfuscation for Java code☆12Oct 3, 2021Updated 4 years ago
- 🔒 Simple compile time string obfuscation using xor☆15Aug 18, 2020Updated 5 years ago
- 字符串混淆工具☆21Feb 15, 2019Updated 7 years ago
- LLVM Obfuscation Pass via Extracted Basic Blocks☆21Aug 10, 2019Updated 6 years ago
- LLVM Obfuscation Pass☆24Dec 2, 2024Updated last year
- ☆21Apr 4, 2020Updated 5 years ago
- Magisk Module with fdisk/sfdisk tools.☆20Oct 26, 2020Updated 5 years ago
- Reverse Engineering about 360 android app guard☆59Feb 27, 2020Updated 6 years ago
- This repository contains codes for wireless-fingerprinting.☆30Feb 10, 2023Updated 3 years ago
- Print Android Binder Data about TRANSACTION☆24May 6, 2019Updated 6 years ago
- android jni trace for arm64 for magisk module!☆90Nov 28, 2025Updated 3 months ago
- an obfuscation-resilient, highly precise and reliable library detector for Android applications☆52Sep 13, 2018Updated 7 years ago
- ☆52Sep 5, 2018Updated 7 years ago
- ARM Emulator Developing(interp + jit + aot)☆28Jun 19, 2020Updated 5 years ago
- Android JNI接口混淆方案☆29Jun 25, 2019Updated 6 years ago
- bypass new soc qualcom☆10Jan 27, 2021Updated 5 years ago
- Substrate/Substitute hooking selector.☆19Oct 13, 2019Updated 6 years ago
- A fork of Hikari's core obfuscation☆73Nov 7, 2020Updated 5 years ago
- 屏蔽所有版本建设银行APP越狱检测☆26Nov 25, 2021Updated 4 years ago
- Java-layer Android Malware Simplifier☆27Jan 21, 2022Updated 4 years ago
- A decompiler for Lua bytecode compiled with luac. Currently targeted at Lua 5.1.☆25Oct 16, 2016Updated 9 years ago
- 逻辑混淆XCode插件☆27Jun 5, 2018Updated 7 years ago
- .so文件加固☆28Mar 14, 2018Updated 7 years ago
- This tool is for flashing qualcomm devices.☆10Feb 22, 2021Updated 5 years ago
- An implementation of the JNI and JVMTI with support for direct interaction between natively registered classes and JVM objects.☆32Aug 26, 2020Updated 5 years ago
- framenthook☆62Aug 22, 2019Updated 6 years ago
- deollvm arm64 based unicorn☆35Jul 4, 2019Updated 6 years ago
- ☆35Dec 2, 2018Updated 7 years ago