ronniebasak / JStructLinks
The python struct library's port to java for reading and writing binary data as in python
☆21Updated 2 years ago
Alternatives and similar repositories for JStruct
Users that are interested in JStruct are comparing it to the libraries listed below
Sorting:
- Assembler and disassembler for Java class files☆67Updated last year
- Java / Kotlin Decompiler and AST Library☆139Updated 7 years ago
- ☆27Updated 6 years ago
- A Decompiler can read the class file, and decompile the bytecode to java code.☆25Updated 5 years ago
- Whitebox AES implementation in Java. Chow scheme.☆97Updated 2 years ago
- ☆40Updated 3 years ago
- A Man-In-The-Middle Proxy as Fiddle and Charles, using Netty, JavaFX☆80Updated last year
- Collections of useful android libraries (mostly mine)☆25Updated 4 years ago
- A simple tool to help finding JNI calls in a x86/ARM disassembly listing☆84Updated 7 years ago
- Detect if device is an emulator by native code.{检查当运行的设备是否是模拟器.}☆46Updated 5 years ago
- Proxy server based on netty☆155Updated 2 years ago
- fork of jamvm 2.0☆13Updated 6 years ago
- An Android project of a packet capture tool, with this capture tool you can capture packet on your Android phone. In addition , now you c…☆75Updated 9 years ago
- Obfuscated/clearable in memory string management☆42Updated last year
- Parse classes.dex in APK file and get strings/methods/class info. no need unzip, no need decompile,☆20Updated 7 years ago
- Continued Java Bytecode Editor, a tool for modifying and analyzing java bytecode structures and class files☆42Updated 9 years ago
- Call graph generator for JVM bytecode☆18Updated 8 years ago
- ☆39Updated 10 years ago
- Provides a java library to read AR, ELF, COFF and other kind of binary files☆61Updated 5 years ago
- OLLVM_Deobfuscation 是一款ollvm反混淆工具,目前 已经能完美实现x86架构Linux平台下,被ollvm混淆过的C/C++代码的反混淆,后续将逐步尝试Android SO文件的反混淆☆21Updated 8 years ago
- Load dex on ART in interpret mode☆18Updated 6 years ago
- convert dex to java class/jar by dx and asm☆25Updated 5 years ago
- JDB++ an jdb extension for easily debugging through smali code☆24Updated last week
- ☆58Updated last year
- The radare2 + frida book for Mobile Application assessment☆40Updated 6 years ago
- ☆11Updated 6 years ago
- Tool for reversing AAPT by remapping R.java values after decompilation/deobfuscation.☆33Updated 7 years ago
- 参考支付宝代码☆45Updated 7 years ago
- Advanced detection of rooting☆74Updated 9 years ago
- just a mirror project☆44Updated 6 years ago