zhkl0228 / AndroidAttacher
IDA debugging plugin for android armv7 so
☆87Updated 6 years ago
Alternatives and similar repositories for AndroidAttacher:
Users that are interested in AndroidAttacher are comparing it to the libraries listed below
- ☆58Updated 7 years ago
- JNI Helper Plugin☆52Updated 2 months ago
- ☆87Updated 3 years ago
- ☆39Updated 7 years ago
- Android Library Code Recognition☆79Updated 9 months ago
- IDA plugin aid to set android so breakpoint☆32Updated 7 years ago
- Various Jeb plugins, including obfuscation restore☆93Updated 8 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- An android hook tools based on cydia substrate☆26Updated 8 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆23Updated 11 years ago
- ☆53Updated 8 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆89Updated 7 years ago
- android arm64(aarch64) code inject☆39Updated 9 years ago
- modify field(modWhen, crc) in android odex file;安卓APP“寄生兽”漏洞☆14Updated 9 years ago
- Android Injector☆23Updated 8 years ago
- Some frida scripts☆141Updated 6 years ago
- Some reverse-engineering scripts☆113Updated 5 years ago
- ElfHooK, reference with boyliang's AllHookInOne project, fix bugs, support android 5/6/7 and aarch64☆29Updated 2 years ago
- Syscall table hook frame in Android kernel for arm and arm64☆81Updated 7 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- ☆32Updated 5 years ago
- unpack UPX on android.☆35Updated 5 years ago
- ☆27Updated 8 years ago
- ☆31Updated 8 years ago
- 逆向聚安全litevm相关☆53Updated 4 years ago
- ☆53Updated 6 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆27Updated 5 years ago
- IDA python script to dynamically dump DEX in memory☆142Updated 8 years ago
- ☆61Updated 5 years ago
- deobfuscation ollvm's fla☆67Updated 6 years ago