Pinned Repositories
-AndroidReverse
安卓逆向学习
-Native-test-
记录牛头检测的一些办法
-root-
利用漏洞获取临时root权限,再永久获取root权限,仅限于mtk设备2021年以前的内核
AllowDebugging
A tool of kernel level for bypassing debug detection!
btrace
btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具
Captcha-recognition
detx
deobf tx libtprt's obfuscation
new-elm
pdf-unstamp
pdf文档去水印
TInjector
劫持Zygote在App启动前注入so
123456789zws's Repositories
123456789zws/.NET-Deobfuscator
Lists of .NET Deobfuscator and Unpacker (Open Source)
123456789zws/AES-ECB-Padding-attack
This tool automates and facilitates a padding attack on AES with ECB mode
123456789zws/android-bypass-solutions
bypass secure solutions in smart way
123456789zws/AntiDebug
一个R3的反调试项目
123456789zws/bypass-anti-fridahooking
Using frida bypass anti hooking by native lib
123456789zws/CefDetector
Check how many CEFs are on your computer. 检测你电脑上有几个CEF.
123456789zws/Dart-Helper
libapp.so分析助手
123456789zws/DHook
DHook是一个支持动态debug,动态修改java程序的web应用.
123456789zws/DuTracker
得物(毒)APP签名(sign)逆向;得物(毒)App运动x潮流x装备商品价格记录、数据可视化;球鞋价值指数追踪
123456789zws/dy233_unidbg_sign
use unidbg to emulate dy23.3.0 for X-Medusa, X-Helios
123456789zws/DynDataResolver
123456789zws/fake-linker
Modify Android linker to provide loading module and hook function
123456789zws/frida-skeleton
基于frida的安卓hook框架,提供了很多frida自身不支持的功能,将hook安卓变成简单便捷,人人都会的事情
123456789zws/frida-xamarin-unpin
A Frida script to bypass Xamarin certificate pinning implementations
123456789zws/FridaHookSwiftAlamofire
A frida tool that capture GET/POST HTTP requests of iOS Swift library 'Alamofire' and disable SSL Pinning.
123456789zws/HideSystemThread
check hide system thread
123456789zws/Hooking-library-Android
This is a open source project for hooking function from any apps on runtime not for root environment
123456789zws/IATelligence
IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&CK matrix related
123456789zws/ida_names
IDA-names automatically renames pseudocode windows with the current function name.
123456789zws/JNIAnalyzer
Analysis scripts for Ghidra to work with Android NDK libraries.
123456789zws/jsvm1
JS virtual machine implementation for education purpose
123456789zws/MemDetection
计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。
123456789zws/NetLogger
Xposed module that hooks into various HTTP libraries to log network calls.
123456789zws/news_feed
实时监控1000家**企业的新闻动态
123456789zws/restringer
A Javascript Deobfuscator
123456789zws/Riru-ModuleFridaGadget
一个magisk 的模块,简化版,依赖 riru,能够简单的hook,并且加载动态库,目前用来加载 frida 的gadget 库,从而使hook脱离命令行和server,并且能够在多进程中加载
123456789zws/sec-books-part1
:books: 网安类绝版图书
123456789zws/upx-recovery-tool
123456789zws/WLWH_LAST
爱奇艺,腾讯视频爬虫。趣头条,大鱼号,qq cookies http客户端。含腾讯视频滑块破解,视频接口逆向。
123456789zws/Zygisk-UnityHook-
zygisk插件:用于unity游戏hook