obpo-project / obpo-plugin
An OLLVM-CFF Deobfuscation Plugin
☆597Updated last year
Alternatives and similar repositories for obpo-plugin:
Users that are interested in obpo-plugin are comparing it to the libraries listed below
- 一个小脚本,用于trace so中native函数的调用。☆503Updated 3 years ago
- ☆319Updated last year
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆568Updated 8 months ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆441Updated 4 years ago
- 一个IDA脚本,可以检测出哈希算法(无论是否魔改常数)并生成frida hook 代码。☆394Updated 3 years ago
- 利用 frida 获取 Jni RegisterNatives 动态注册的函数☆323Updated last year
- use angr to deobfuscation☆627Updated 4 months ago
- ☆312Updated 8 months ago
- 通过内存特征检测frida☆472Updated 5 years ago
- ☆792Updated 3 years ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆227Updated 4 years ago
- 整理一些unidbg常用的工具在这里☆326Updated 2 years ago
- An improved version of AndroidNativeEmu,Allow running android elf on PC☆667Updated last year
- IDA Frida Plugin for tracing something interesting.☆269Updated last month
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆565Updated 3 months ago
- Allows you to partly emulate an Android native library.☆359Updated 4 years ago
- an android method tracer gui tool base-on frida☆452Updated 5 years ago
- 记录一些我自己在学习Android逆向过程中的有意思的东西☆785Updated last year
- 简悦导入文章☆333Updated last week
- android memory access trace utility powered by frida framework☆234Updated 2 years ago
- 使用Binary Ninja去除ollvm流程平坦混淆☆418Updated 4 years ago
- An anti detection version frida-server for android.☆566Updated this week
- 在FART的基础上进行优化。实现更深的主动调用。适用AOSP10☆227Updated 3 years ago
- 基础反检测 frida-server / Basic anti-detection frida-server☆819Updated this week
- 🔨 Break Java Reverse Engineering form Memory World!☆830Updated last year
- Android 加固应用Hook方式-Frida☆273Updated 2 years ago
- Script to quickly hook natives call to JNI in Android☆550Updated last year
- ☆314Updated 3 years ago
- strongR-frida☆199Updated 3 years ago
- 梆梆企业加固详细逆向分析过程, 包含两种对该加固的脱壳机(直接解密classes0.jar和基于frida hook)☆422Updated 5 years ago