xxtea / xxtea-java
XXTEA encryption algorithm library for Java.
☆144Updated 9 years ago
Alternatives and similar repositories for xxtea-java:
Users that are interested in xxtea-java are comparing it to the libraries listed below
- hook java methods☆136Updated 7 years ago
- Native IO Redirect implementation for Android.☆74Updated 9 years ago
- ☆58Updated last year
- 解析Android中xml文件格式☆83Updated 8 years ago
- Android安全防护的几种反调试方案策略☆170Updated 8 years ago
- Android apk包res 资源混淆工具☆96Updated 7 years ago
- 通过Xposed框架hook android的敏感函数,具体参考https://github.com/halfkiss/ZjDroid, 并添加了相应的函数☆72Updated 6 years ago
- ☆126Updated 8 years ago
- A java method hook library for android dalvik☆202Updated 10 years ago
- Android app防dex2jar的gradle插件☆258Updated 2 years ago
- NDK实现的工具库,支持AES的ECB和CBC加解密(支持emoji),MD5加盐☆110Updated 7 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆60Updated 9 years ago
- Native IO Redirect implementation for Android.☆27Updated 9 years ago
- OpenSSL Library for iOS and Android☆42Updated 7 years ago
- ☆227Updated 6 years ago
- A library for check whether your app run in a virtual project.☆86Updated 7 years ago
- 通付盾第一代安全加固方案☆172Updated 10 years ago
- Android 使用jni校验应用签名sha1值,防止so文件逆向盗用☆132Updated 5 years ago
- Android application hooking tool based on FastHook + VirtualApp☆175Updated 6 years ago
- Parser and Modify AndroidManifest.xml to prevent APK from re-packege☆113Updated 10 years ago
- 一个动态解析Protobuf文件的测试工具☆72Updated 9 years ago
- Automatic Unpacking Tool for Android Dex Files☆144Updated 8 years ago
- apimonitor ZjDroid是基于Xposed Framewrok的动态逆向分析模块,逆向分析者可以通过ZjDroid完成以下工作: DEX文件的内存dump 基于Dalvik关键指针的内存BackSmali,有效破解加固应用 敏感API的动态监控 指定内存区域数…☆56Updated 8 years ago
- 自动加固Android App☆83Updated 6 years ago
- 解析Android中so文件格式☆88Updated 8 years ago
- android inject and hook demo☆28Updated 10 years ago
- A Lightweight Crypto Library (NDK), support AES/DES/MD5/SHA1/SHA256/SHA512/Base64☆47Updated 9 years ago
- AndroidUltimateEncrypt AndroidJNI Encrypt ,运用JNI读取公钥、包名、设备号,然后把结果进行自定义加密,得到一个密码,可以将该密码作为AES的密钥。☆210Updated 7 years ago
- 基于文件特征的Android模拟器检测☆179Updated 8 years ago
- ☆42Updated 10 years ago