xiaokanghub / IDA-Android-unpackLinks
Android 脱壳
☆14Updated 3 years ago
Alternatives and similar repositories for IDA-Android-unpack
Users that are interested in IDA-Android-unpack are comparing it to the libraries listed below
Sorting:
- unpack UPX on android.☆35Updated 6 years ago
- ☆31Updated 3 years ago
- ☆45Updated 6 years ago
- A frida module to parse Elf headers in runtime☆35Updated 5 years ago
- IDA plugin aid to set android so breakpoint☆32Updated 7 years ago
- Dump process memory with FRIDA.☆16Updated last year
- Start method tracing using Android's internal APIs☆13Updated 7 years ago
- 安卓工程师进阶之路☆27Updated 4 years ago
- ☆15Updated 3 years ago
- substrate framework for android based on frida☆16Updated 5 years ago
- ☆21Updated 5 years ago
- Small Apps As PoC to Detect Frida With Frida☆52Updated 3 years ago
- Dump and fix the android so file☆39Updated 4 years ago
- Obfuscated Binaries☆29Updated 2 years ago
- A modified android 8.1 for reverse engineer...☆11Updated 5 years ago
- android hide root demo, code from Magisk☆20Updated 6 years ago
- 修复通过FART dump下来的dex☆29Updated 4 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆19Updated 5 years ago
- simple dex string deobfuscator☆13Updated 5 years ago
- hzytrace☆15Updated 2 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- obpo backend server written by golang☆32Updated last year
- rewrite dex file☆41Updated 3 years ago
- Update Frida hooks automatically.☆27Updated last year
- OLLVM_Deobfuscation 是一款ollvm反混淆工具,目前已经能完美实现x86架构Linux平台下,被ollvm混淆过的C/C++代码的反混淆,后续将逐步尝试Android SO文件的反混淆☆21Updated 7 years ago
- 修改Opcode有关,写入map文件时函数末尾数据暂时有问题☆15Updated 7 years ago
- Reverse Engineering about 360 android app guard☆58Updated 5 years ago
- An Xposed plugin loader without rebooting the phone☆3Updated 3 years ago
- ☆32Updated 5 years ago
- 修改版substrate Hook,使用源码编译成静态库☆14Updated 6 years ago