wangyuan0217 / ReverseStudyLinks
个人逆向学习
☆29Updated last year
Alternatives and similar repositories for ReverseStudy
Users that are interested in ReverseStudy are comparing it to the libraries listed below
Sorting:
- 检测app是否被frida/xposed注入☆70Updated 10 months ago
- 魔改sandhook特征,MikRom注入dex实现免root的xposed案例☆42Updated 3 years ago
- FunELF(基于Xposed实 现的SO脱壳机,用于还原内存中释放的SO文件。)☆60Updated 2 years ago
- Xposed免root注入so方案, 支持android各个版本☆237Updated last year
- 安卓逆向学习☆102Updated 4 months ago
- fix dex by dump dexCodeItem☆45Updated last year
- ☆53Updated 2 years ago
- LSPosed模块的两个利器:classmonitor和jnitrace☆189Updated last year
- FunJni(JNITrace & hook ,So分析神器 )☆133Updated 2 years ago
- 注入so使用dobby的demo☆19Updated 3 years ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆127Updated 2 years ago
- 安卓插件化开发 学习☆19Updated 9 months ago
- This is a tool used to inject so to any app by ptrace.☆96Updated 3 months ago
- 修改app包名,实现随机包名,☆55Updated 3 years ago
- frida-gadget injection tool based on xposed☆47Updated 2 years ago
- Xposed 注释版本☆14Updated 5 years ago
- 一款二进制逆向调试工具,用于内存数据查看、修改、获取等操作☆36Updated 2 years ago
- 使用 Frida Stalker 反 OLLVM 算法还原(函数调用分析、参数分析、打印调用堆栈、指令&寄存器Trace)。 Using Frida Stalker to Bypass OLLVM and Restore (Function Call Analysis, …☆73Updated 4 months ago
- 用于练手的环境检测的demo☆91Updated 2 years ago
- Hook ArtMethod::RegisterNative 动态注册无法逃离这个函数 防止某些app自实现动态注册,不走jni的registerNatives☆39Updated 4 years ago
- GirlHook is a Lua-scriptable ART hook framework designed for dynamic method interception and gadget-level instrumentation on Android. G.I…☆196Updated 6 months ago
- ☆36Updated 3 years ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆82Updated 3 years ago
- frida打印java调用栈的详细信息☆40Updated 11 months ago
- 一个用于抹去ptrace注入部分文件特征的apatch内核模块☆55Updated 3 months ago
- android jni trace for arm64 for magisk module!☆90Updated 2 months ago
- Xposed实现的OkHttp日志拦截器,可添加Header & Query参数☆52Updated 4 years ago
- 这是一个Android Project,具备设备指纹采集,设备安全检测的能力☆254Updated last month
- frida 持久化☆44Updated 2 years ago
- ☆143Updated last year