ohaz / antiproguard
☆15Updated 4 years ago
Alternatives and similar repositories for antiproguard:
Users that are interested in antiproguard are comparing it to the libraries listed below
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆66Updated 5 years ago
- Files used to resolve the r2pay challenge☆50Updated 4 years ago
- ☆28Updated 6 years ago
- Android library for detecting Android virtual containers.☆68Updated 4 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆88Updated 7 years ago
- Frida module to continue stalking on pthread_create☆20Updated 5 years ago
- Utility to read custom structure from Tencent's libshell packer☆38Updated 6 years ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆63Updated 2 years ago
- ☆50Updated last year
- A powerful tool to dump dex files whose instructions are replaced with nop☆57Updated 4 years ago
- A frida module to parse Elf headers in runtime☆32Updated 5 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆137Updated 9 years ago
- Dynamic Process name change for Android Apps☆28Updated 4 years ago
- My own collection of Frida scripts and tricks☆68Updated 3 years ago
- Android Library Code Recognition☆80Updated 11 months ago
- Android rootkit☆40Updated 9 years ago
- JNI Helper Plugin☆52Updated 3 months ago
- Create an outbound stream over a message transport.☆19Updated last year
- Obfuscated Binaries☆29Updated 2 years ago
- a universal and automated unpacking system☆43Updated 7 years ago
- Traces syscalls on iOS via Frida, including Mach syscalls☆69Updated 11 months ago
- Plugins for reversing android apps in JEB☆68Updated 5 months ago
- jni.h compiled for Ghidra☆78Updated 5 years ago
- Magisk Module with strace☆29Updated 4 years ago
- ☆30Updated 2 years ago
- Frida module to hook module initializations on android☆67Updated 4 years ago
- Hook native with xposed☆17Updated 3 years ago
- Root takeover via signature spoofing in KernelSU☆17Updated last year
- read process memory with process_vm_readv☆16Updated 5 years ago
- get android app signature without java api☆33Updated 6 years ago