thestr4ng3r / frida-cpp
Tools for inspecting C++ code and STL objects with Frida
☆30Updated 3 years ago
Alternatives and similar repositories for frida-cpp:
Users that are interested in frida-cpp are comparing it to the libraries listed below
- deobf tx libtprt's obfuscation☆42Updated 7 months ago
- anti ollvm like flat/bcf/sub☆73Updated 5 years ago
- deobfuscation BR☆43Updated last year
- break ollvm.☆99Updated 4 years ago
- IDA Python Script for anti ollvm-arm☆27Updated 3 years ago
- An approach to utilize auditd under Android 6+☆21Updated 6 years ago
- ☆17Updated 9 months ago
- Obfuscated Binaries☆29Updated 2 years ago
- A frida module to parse Elf headers in runtime☆32Updated 5 years ago
- ☆59Updated 8 months ago
- tprt ollvm 反混淆 修改 binja il☆39Updated 6 months ago
- 蛋蛋模拟器分析附件☆4Updated 3 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆32Updated 8 months ago
- ☆15Updated 2 years ago
- A IDA plugin to show ARM MSRs nicely☆83Updated 2 years ago
- rewrite dex file☆41Updated 3 years ago
- ☆21Updated 4 years ago
- obpo backend server written by golang☆32Updated last year
- Taint Analysis Engine and Trace Exploration : Overcome Obfuscation☆37Updated this week
- D-810 is an IDA Pro plugin which can be used to deobfuscate code at decompilation time by modifying IDA Pro microcode.☆49Updated 3 years ago
- monitor svc calls of android☆73Updated 6 years ago
- a poc implementation arm64 tracer based on simulation☆54Updated 3 years ago
- Frida module to continue stalking on pthread_create☆20Updated 5 years ago
- Resume FuncOutline by idapython☆27Updated 7 months ago
- A program to read and modify the memory of other processes.☆17Updated last year
- ☆30Updated 2 years ago
- Update Frida hooks automatically.☆27Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- read process memory with process_vm_readv☆16Updated 5 years ago
- Deobfuscate OLLVM Bogus Control Flow via angr☆63Updated 3 years ago