thestr4ng3r / frida-cppLinks
Tools for inspecting C++ code and STL objects with Frida
☆32Updated 4 years ago
Alternatives and similar repositories for frida-cpp
Users that are interested in frida-cpp are comparing it to the libraries listed below
Sorting:
- anti ollvm like flat/bcf/sub☆73Updated 6 years ago
- IDA Python Script for anti ollvm-arm☆29Updated 4 years ago
- break ollvm.☆113Updated 7 months ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- ☆15Updated 3 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆33Updated last year
- read process memory with process_vm_readv☆16Updated 5 years ago
- rewrite dex file☆42Updated 4 years ago
- A frida module to parse Elf headers in runtime☆37Updated 6 years ago
- JNI Helper for IDA 7.4+☆41Updated last year
- A IDA plugin to show ARM MSRs nicely☆85Updated 2 years ago
- ☆33Updated 3 years ago
- ☆61Updated last year
- ART tracing research☆92Updated 2 years ago
- This is a IDA plugin that integrates several modules of miasm☆22Updated 5 years ago
- 使用Unicorn解密Hikari加密过的字符串(觉得好的话给个star呗!)☆56Updated 6 years ago
- deollvm arm64 based unicorn☆35Updated 6 years ago
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆171Updated 3 years ago
- Obfuscated Binaries☆32Updated 2 years ago
- deobfuscator llvm arm64 script☆95Updated 6 years ago
- A program to read and modify the memory of other processes.☆18Updated 2 years ago
- deobf tx libtprt's obfuscation☆54Updated last year
- ☆41Updated 3 years ago
- unpack UPX on android.☆35Updated 6 years ago
- deobfuscation BR☆53Updated last year
- monitor svc calls of android☆74Updated 7 years ago
- ☆89Updated 4 years ago
- Simple Android ARM&ARM64 GOT Hook☆37Updated 3 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆91Updated 7 years ago
- Android rootkit☆44Updated 9 years ago