quarkslab / legu_unpacker_2019
Scripts to unpack APK protected by Legu
☆216Updated last year
Alternatives and similar repositories for legu_unpacker_2019:
Users that are interested in legu_unpacker_2019 are comparing it to the libraries listed below
- Example showing how to use Frida for standalone injection of a custom payload☆158Updated 4 years ago
- this unpack script for Android O and Android P☆303Updated 5 years ago
- Inject frida agents on local processes through an Android app☆267Updated 3 years ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆228Updated 4 years ago
- Some frida scripts☆141Updated 6 years ago
- The second generation Android Hardening Protection☆393Updated 6 years ago
- ☆153Updated 5 years ago
- Instructions tracing powered by frida☆178Updated 5 years ago
- Automated Frida hook generation with JEB☆141Updated last year
- Engine used by jnitrace to intercept JNI API calls.☆314Updated last year
- Android内联hook框架☆325Updated 5 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆135Updated 9 years ago
- iOS/android frida library for reversing☆248Updated 4 years ago
- ☆121Updated 5 years ago
- Hook SSL_read and SSL_write functions in the Android application with Frida.☆119Updated 5 years ago
- Java runtime interop from Frida☆337Updated this week
- Runs frida-server on boot as root with magisk.☆213Updated last year
- PoC Frida script to view Android libbinder traffic☆135Updated 6 months ago
- Trace APIs declaratively through Frida.☆227Updated last year
- ART tracing research☆88Updated 2 years ago
- 使用Binary Ninja去除ollvm流程平坦混淆☆419Updated 5 years ago
- Script to quickly hook natives call to JNI in Android☆553Updated last year
- IDA plugin, unwind stack trace when debugging arm.