zhkl0228 / impersonator
Spoof TLS/JA3/JA4 and HTTP/2 fingerprints in Java
☆14Updated this week
Related projects ⓘ
Alternatives and complementary repositories for impersonator
- VPN packet capture server☆14Updated 3 weeks ago
- Trace jni calls with eBPF on Android☆24Updated 2 years ago
- An Xposed plugin loader without rebooting the phone☆3Updated 2 years ago
- 基于Xposed Hook敏感API☆12Updated 2 years ago
- search all symbal in ELF file(dlsym can not find)☆27Updated 5 years ago
- frida_hook_dlopen☆12Updated 4 years ago
- testabstract☆10Updated 4 years ago
- 安卓逆向学习☆11Updated 2 years ago
- ☆9Updated 3 years ago
- Reverse Engineering about 360 android app guard☆57Updated 4 years ago
- APatch KernelPatch QEMU Debug Environment☆13Updated 2 months ago
- Android中通过抽取类方法指令信息的加固方案☆9Updated 7 years ago
- Frida web client☆39Updated 3 weeks ago
- Android ask repacked detect.☆13Updated 3 years ago
- Android-Syscall-Logger☆19Updated 3 years ago
- Android-Anti-AntiTrace☆11Updated 5 years ago
- Hook ArtMethod::RegisterNative 动态注册无法逃离这个函数 防止某些app自实现动态注册,不走jni的registerNatives☆23Updated 3 years ago
- 一个简易的unicorn tracer,剪裁自项目Rainbow。☆22Updated 3 years ago
- build frida or hluda in docker☆12Updated 2 years ago
- ☆18Updated 2 years ago
- App传输协议逆向 MD5 、AES 、DES 、RSA 、SSLPING☆10Updated 4 years ago
- deollvm arm64 based unicorn☆34Updated 5 years ago
- ☆29Updated 7 months ago
- A modified android 8.1 for reverse engineer...☆10Updated 4 years ago
- 主要记录对各路frida脚本的整理,长期更新☆29Updated last year
- Android So Fix☆20Updated 6 years ago