wangyuan0217 / ReverseStudyLinks
个人逆向学习
☆28Updated last year
Alternatives and similar repositories for ReverseStudy
Users that are interested in ReverseStudy are comparing it to the libraries listed below
Sorting:
- 魔改sandhook特征,MikRom注入dex实现免root的xposed案例☆41Updated 3 years ago
- FunELF(基于Xposed实现的SO脱壳机,用于还原内存中释放的SO文件。)☆58Updated 2 years ago
- Hook ArtMethod::RegisterNative 动态注册无法逃离这个函数 防止某些app自实现动态注册,不走jni的registerNatives☆37Updated 4 years ago
- Xposed免root注入so方案, 支持android各个版本☆223Updated last year
- Xposed 注释版本☆12Updated 5 years ago
- FunJni(JNITrace & hook ,So分析神器 )☆129Updated 2 years ago
- 一款二进制逆向调试工具,用于内存数据查看、修改、获取等操作☆33Updated last year
- ☆50Updated 2 years ago
- 修改app包名,实现随机包名,☆52Updated 3 years ago
- LSPosed模块的两个利器:classmonitor和jnitrace☆189Updated last year
- 检测app是否被frida/xposed注入☆56Updated 6 months ago
- This is a tool used to inject so to any app by ptrace.☆91Updated 2 years ago
- frida-gadget injection tool based on xposed☆44Updated 2 years ago
- fix dex by dump dexCodeItem☆42Updated last year
- 注入so使用dobby的demo☆18Updated 3 years ago
- 算法工具☆23Updated 2 years ago
- Xposed实现的OkHttp日志拦截器,可添加Header & Query参数☆50Updated 4 years ago
- ☆36Updated 3 years ago
- xposed 通用模板☆23Updated 3 years ago
- 安卓插件化开发 学习☆15Updated 5 months ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆122Updated last year
- 安卓逆向学习☆75Updated 2 weeks ago
- frida 持久化☆43Updated 2 years ago
- 使用 Frida Stalker 反 OLLVM 算法还原(函数调用分析、参数分析、打印调用堆栈、指令&寄存器Trace)。 Using Frida Stalker to Bypass OLLVM and Restore (Function Call Analysis, …☆57Updated last month
- 基于Riru模块的改机模块☆88Updated 3 years ago
- frida打印java调用栈的详细信息☆38Updated 8 months ago
- 这是一个Android Project,具备设备指纹采集,设备安全检测的能力☆225Updated last month
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆75Updated 2 years ago
- frida normal used hook script☆32Updated 3 years ago
- one key encryptor android classes.dex and repatch apk☆45Updated last year