nzcv / arm64_junk_code
arm64 junk code sample
☆13Updated 3 years ago
Alternatives and similar repositories for arm64_junk_code:
Users that are interested in arm64_junk_code are comparing it to the libraries listed below
- a poc implementation arm64 tracer based on simulation☆54Updated 3 years ago
- hwBreakpoint Test App☆18Updated 2 years ago
- 一个简易的unicorn tracer,剪裁自项目Rainbow。☆26Updated 4 years ago
- 使用 frida stalker 实现的 trace☆27Updated 2 years ago
- ida 对抗 花指令, 基于 ida 7.5 sdk 编写☆18Updated last year
- deobf tx libtprt's obfuscation☆44Updated 8 months ago
- Single-step debugging of native code using frida, stalker, and semaphore☆75Updated 6 months ago
- 检测got hook(使用xhook测试)☆26Updated 3 years ago
- Inotify监听测试☆34Updated 3 years ago
- ☆21Updated 5 years ago
- 研究内核改机策略☆57Updated last year
- An approach to utilize auditd under Android 6+☆21Updated 6 years ago
- try try full features ebpf on android without Pixel 6☆21Updated 2 years ago
- 反反frida调试☆23Updated 2 years ago
- Android So Fix☆25Updated 6 years ago
- vm 还原的分享☆64Updated 7 months ago
- android8 arm64 注入方案☆36Updated 3 years ago
- unicorn demo☆26Updated 4 years ago
- APatch KernelPatch QEMU Debug Environment☆22Updated 7 months ago
- ☆17Updated 2 years ago
- deobfuscation BR☆46Updated last year
- 帮助逆向者使用ida便利地调试apk so文件,抛开调试前的那些麻烦步骤☆44Updated 3 years ago
- tprt ollvm 反混淆 修改 binja il☆40Updated 8 months ago
- A Project for people to study android svc.☆25Updated 2 years ago
- deollvm arm64 based unicorn☆36Updated 5 years ago
- 2023 年 羊城杯 ezAndroid dex VMP 恢复工具☆35Updated last year
- Android-Syscall-Logger☆22Updated 4 years ago
- use xposed inject so☆17Updated 5 years ago
- A program to read and modify the memory of other processes.☆17Updated last year
- ☆42Updated last year