tweksteen / oplzkwpLinks
ELF obfuscator
☆68Updated 10 years ago
Alternatives and similar repositories for oplzkwp
Users that are interested in oplzkwp are comparing it to the libraries listed below
Sorting:
- some idapython scripts for android debugging.☆45Updated 8 years ago
- ELF packer - x86_64☆73Updated 10 years ago
- Original code about binary encryption from phrack☆72Updated 13 years ago
- Obfuscates dynamic symbol table☆135Updated 6 years ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Updated 5 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆47Updated 7 years ago
- All You Need For Ida Pro And Android Debugging☆62Updated 10 years ago
- Malicious use of ELF such as .so inject, func hook and so on.☆76Updated 8 years ago
- Git copy of idapython svn repo: https://code.google.com/p/idapython/☆48Updated 11 years ago
- Varoius IDC-scripts I've collected during the years.☆139Updated 11 years ago
- Cross-platform tool for scanning memory of other processes☆29Updated 8 years ago
- simple VM crackme demo☆32Updated 9 years ago
- Collection of various llvm passes☆128Updated 10 years ago
- a android shared library dynamic loader☆19Updated 9 years ago
- ARM virtual machine☆40Updated 7 years ago
- Experimental opaque predicate detection for IDA Pro☆82Updated 7 years ago
- JNI Helper for IDA 7.4+☆40Updated last year
- This project contains several exercises about injection using ptrace on Android platform☆65Updated 9 years ago
- A shared libraries injection tool.☆128Updated 10 years ago
- integration with IDA☆93Updated 4 years ago
- Android rootkit☆42Updated 9 years ago
- LD_PRELOAD magic for Android's AssetManager☆79Updated 3 years ago
- IDA debugging plugin for android armv7 so☆87Updated 7 years ago
- Recover control flow graph from obfuscated codes☆39Updated 10 years ago
- ARM Shellcode Generator☆102Updated 8 years ago
- ☆53Updated 7 years ago
- Syscall table hook frame in Android kernel for arm and arm64☆81Updated 8 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆90Updated 7 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆102Updated 8 years ago
- Python script which extracts procedures from IDA Win32 LST files and converts them to correctly dynamically linked compilable Visual C++ …☆27Updated 16 years ago