nobalai / art_jit_parserLinks
Android runtime jit binary file parser
☆13Updated 7 years ago
Alternatives and similar repositories for art_jit_parser
Users that are interested in art_jit_parser are comparing it to the libraries listed below
Sorting:
- Dynamic binary analysis via platform emulation☆12Updated 7 years ago
- Trying for all arch detour stuff now☆11Updated 8 years ago
- ARMv7 detour function for hooking junk (no thumb support, unaligned accesses are not atomic)☆16Updated 8 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Updated 7 years ago
- ☆14Updated 7 years ago
- ☆24Updated 8 years ago
- oneHookLibraryIOS☆11Updated 4 years ago
- some idapython scripts for android debugging.☆45Updated 8 years ago
- ☆12Updated 7 years ago
- 娜迦DEX文件修复程序☆25Updated 8 years ago
- ☆41Updated 8 years ago
- IDA Pro plug-in to fix/extract/view RTTI information☆11Updated 7 years ago
- ☆15Updated 6 years ago
- uc::jni is a Java Native Interface (JNI) wrapper library created C++14 single-header.☆11Updated 6 years ago
- ☆16Updated 6 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆14Updated 6 years ago
- Trace Log Generation (CLI) on a target device or emulator : Generating context information of every instruction from a specific point (in…☆22Updated 8 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Updated 8 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- A C/C++ code obfuscator based on llvm/clang technology☆16Updated 10 years ago
- collection of scripts and stuff☆12Updated 9 years ago
- Recover control flow graph from obfuscated codes☆39Updated 10 years ago
- ☆25Updated 9 years ago
- Rootkit。 进程监控。☆11Updated 9 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆15Updated 10 years ago
- Free_the_Debuggers☆19Updated 10 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- Start method tracing using Android's internal APIs☆13Updated 7 years ago
- ☆12Updated 8 years ago