Pinned Repositories
160-Crackme
对160个Crackme的详细分析记录
android-afl
Fuzzing Android program with american fuzzy lop (AFL)
Android-Inline-Hook
thumb16 thumb32 arm32 inlineHook in Android
arm-gcc-inline-assembler
ARM GCC 内联汇编参考手册 - 中文版
awesome-design-cn
设计师资源大全,包含:ICON图标、Logo设计、PhotoShop插件、交互设计工具、流程图、线框图/原型图、设计博客等
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
bilibili-API-collect
哔哩哔哩-API收集整理【不断更新中....】
binary_vulnerability
二进制漏洞之栈溢出原理和利用技术、绕过安全保护技术(绕过 NX、 ASLR、PIE、Canary、RELRO 等)、格式化字符串漏洞原理是利用技术、整数溢出漏 洞原理和利用技术、glibc2.30 内存管理源码深入分析、堆溢出漏洞(fastbin 攻击、 UAF、double free、堆重叠和扩展攻击、unlink 攻击、house 系列攻击)漏洞原理和攻 击技巧
CGLib-for-Android
CGLib-for-Android (Dex code Generation Library for Android) is high level API to dynamicall generate sub class, its implementation based on DexMaker. This library use for AOP, method intercept, data access authorization authentication on Android.
command
红队常用命令速查
tjy1985001's Repositories
tjy1985001/160-Crackme
对160个Crackme的详细分析记录
tjy1985001/binary_vulnerability
二进制漏洞之栈溢出原理和利用技术、绕过安全保护技术(绕过 NX、 ASLR、PIE、Canary、RELRO 等)、格式化字符串漏洞原理是利用技术、整数溢出漏 洞原理和利用技术、glibc2.30 内存管理源码深入分析、堆溢出漏洞(fastbin 攻击、 UAF、double free、堆重叠和扩展攻击、unlink 攻击、house 系列攻击)漏洞原理和攻 击技巧
tjy1985001/command
红队常用命令速查
tjy1985001/android-cuttlefish
Cuttlefish host support debian package.
tjy1985001/android_analysis
a few android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog
tjy1985001/DeepNude-an-Image-to-Image-technology
DeepNude related Image-to-Image theory and practice research. DeepNude相关的Image-to-Image理论与实践研究。
tjy1985001/Dobby
a lightweight, multi-platform, multi-architecture hook framework.
tjy1985001/DoraBox
DoraBox - Basic Web Vulnerability Training
tjy1985001/electronic-wechat
:speech_balloon: A better WeChat on macOS and Linux. Built with Electron by Zhongyi Tong.
tjy1985001/elfloader
ARMv7M ELF loader
tjy1985001/exploit
Summary of binary vulnerability mining techniques
tjy1985001/FrankeNDK
Frankenstein NDK for building Magisk
tjy1985001/frida-all-in-one
《FRIDA操作手册》by @hluwa @r0ysue
tjy1985001/hutool
🍬A set of tools that keep Java sweet.
tjy1985001/jtik
Dynamic java method hook for Android,Implemented by jvmti
tjy1985001/KernelSU_Action
A action for build KernelSU into your kernel
tjy1985001/MagiskOnWSALocal
Integrate Magisk root and Google Apps into WSA (Windows Subsystem for Android)
tjy1985001/PaddleHub
Awesome pre-trained models toolkit based on PaddlePaddle.(180+ models including CV, NLP, Audio and Video with Easy Inference & Serving deployment)
tjy1985001/PoCBox
PoCBox - Vulnerability Test Aid Platform
tjy1985001/pure-bash-bible-zh_CN
📖 一个纯bash实现外部命令的脚本集合(中文版)【翻译自pure-bash-bible仓库】
tjy1985001/pwntools
CTF framework and exploit development library
tjy1985001/RestrictionBypass
Android API restriction bypass for all Android Versions
tjy1985001/secbook
信息安全从业者书单推荐
tjy1985001/security_w1k1
大手子们要是使用过后,能给菜鸡弟弟在Issues反馈个用后体验,那就真的是万分感激了。你一赞,我一赞,年薪百万不停转。
tjy1985001/sekiro
基于长链接和代码注入的Android private API暴露框架
tjy1985001/ss5
ss5 server, fork from https://sourceforge.net/projects/ss5/
tjy1985001/strong-frida
make frida strong, bypass frida detection.
tjy1985001/TEE-reversing
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
tjy1985001/unpacker
基于ART主动调用的脱壳机
tjy1985001/webvm
Virtual Machine for the Web