pgarba / SquanchyLinks
☆53Updated 6 months ago
Alternatives and similar repositories for Squanchy
Users that are interested in Squanchy are comparing it to the libraries listed below
Sorting:
- tprt ollvm 反混淆 修改 binja il☆50Updated last year
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆89Updated 9 months ago
- Frida's setHardwareWatchpoint tutorial☆63Updated last year
- GitHub Actions to analyse file using IDA☆35Updated last year
- Android assembly instruction tracing tool☆139Updated 9 months ago
- Taint Analysis Engine and Trace Exploration : Overcome Obfuscation☆51Updated 3 months ago
- vm 还原的分享☆76Updated last year
- System Call Hook for ARM64☆206Updated 3 weeks ago
- 基于 Unicorn 引擎的轻量级 ARM64 动态追踪模拟工具。支持 IDA Pro、生成 Tenet 日志、本地代码模拟、内存转储、寄存器状态追踪和指令级日志记录。☆168Updated this week
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆24Updated 2 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆86Updated last year
- AntiOllvm Fla with Fake Runtime☆179Updated last year
- It can help you better use Frida in SO binaries☆35Updated 2 years ago
- ☆59Updated 2 years ago
- A zygisk module that dumps so file from process memory☆94Updated last year
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆177Updated 11 months ago
- 去除BR混淆 Deobfuscation BR☆89Updated last year
- Resume FuncOutline by idapython☆28Updated last year
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 5 months ago
- Getting better stacks and backtraces in Frida☆58Updated last month
- deobfuscation BR☆53Updated last year
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆152Updated last year
- deflat plugins for ida pro☆45Updated 2 years ago
- Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBA☆195Updated 2 years ago
- 使用 frida stalker 实现的 trace☆29Updated 3 years ago
- deobf tx libtprt's obfuscation☆56Updated last year
- SherlockElf is a powerful tool designed for both static and dynamic analysis of Android ELF binaries and dynamic iOS Macho-O binaries (ex…☆100Updated last month
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆66Updated last year
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆73Updated last year
- 对目标函数进行trace 只适用于 arm64☆157Updated 4 months ago