qs00019 / MessNative
Android JNI接口混淆方案
☆25Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for MessNative
- 查看dex中class, field, method内部与外部依赖☆27Updated 5 years ago
- 黑科技:提升进程优先级的一种思路☆16Updated 3 years ago
- Apk 加固源码示例☆32Updated 7 years ago
- Android JNI 监控指定目录下的文件以及子目录及子目录下的文件,支持传参控制要监听的事件,主要使用linux inotify和epoll实现☆36Updated 2 years ago
- Obfuscator-LLVM 4.0 build & setup into NDK☆36Updated 3 years ago
- 搜集Android设备唯一标识码,并且区分出真实设备和虚拟设备☆23Updated 6 years ago
- Android 各版本新特性及避坑指南☆13Updated last year
- apk 加固框架,包括dex加固,资源混淆,签名验证☆23Updated 4 years ago
- Detect if device is an emulator by native code.{检查当运行的设备是否是模拟器.}☆44Updated 4 years ago
- apk加固☆14Updated 6 years ago
- aapt和aapt2固定资源id,以及为资源进行public flag标记。☆16Updated 3 years ago
- hook java方法,基于art虚拟机☆12Updated last year
- android通过ndk加解密和防apk反编译。☆16Updated 7 years ago
- 学习jni及反调试策略☆49Updated 6 years ago
- Xposed模块,截取程序崩溃日志进行弹窗显示。☆21Updated 3 years ago
- Android Sync Binder☆32Updated 4 years ago
- 基于mapping.txt文件,根据原始class名或方法名获取混淆后的class名或方法名,根据混淆后的class名或方法名获取原始class名或方法名,堆栈还原等☆51Updated 5 years ago
- SandHook在Android上的Hook应用☆11Updated 11 months ago
- 被动依赖注入框架 for Android☆17Updated 5 years ago
- DroidPlugin and Atlas practise samples to know them well☆13Updated 4 years ago
- Parse classes.dex in APK file and get strings/methods/class info. no need unzip, no need decompile,☆20Updated 7 years ago
- Android Performance Tools. ANR, Dead locks and lags. Android性能监测工具. 监测了 ANR, 死锁和卡顿.☆15Updated 2 years ago
- jni加密解密,jni签名检测,jni模拟器检测,jni-xpose框架检测,jni-root机器检测☆38Updated 3 years ago
- 能自动实现Apk加固的Gradle插件☆31Updated 6 years ago
- ☆14Updated 4 years ago
- 适用于 Android 的 OpenGL ES 库,Android动态壁纸。☆10Updated last year
- 基于Smali文件 Android Studio 动态调试 APP☆36Updated 4 years ago
- Xposed版UETool插件☆43Updated 4 years ago
- 检测 模拟器 xposed root等☆11Updated 4 years ago