windy1946's Stars
yanivagman/BPFroid
Trace Android framework API, native libraries, system calls and other events using eBPF
GANGE666/xVMP
mcuking/wasmc
:sparkles: A WebAssembly interpreter written in C for demonstration
albertan017/LLM4Decompile
Reverse Engineering: Decompiling Binary Code with Large Language Models
vvb2060/MagiskDetector
android-hacker/VirtualXposed
A simple app to use Xposed without root, unlock the bootloader or modify system image, etc.
patois/HRDevHelper
HexRays ctree visualization plugin
RolfRolles/HexRaysDeob
Hex-Rays microcode API plugin for breaking an obfuscating compiler
gaasedelen/lucid
An Interactive Hex-Rays Microcode Explorer
quarkslab/qsynthesis
Greybox Synthesizer geared for deobfuscation of assembly instructions.
joydo/d810
Python3WebSpider/ProxyPool
An Efficient ProxyPool with Getter, Tester and Server
NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework
kkevsekk1/AutoX
A UiAutomator on android, does not need root access(安卓平台上的JavaScript自动化工具)
lm-sys/FastChat
An open platform for training, serving, and evaluating large language models. Release repo for Vicuna and Chatbot Arena.
zhgqthomas/books
ele7enxxh/Android-Inline-Hook
thumb16 thumb32 arm32 inlineHook in Android
wanchouchou/ManifestAmbiguity
Parser and Modify AndroidManifest.xml to prevent APK from re-packege
pantaloons/RSA
Simple implementation of the RSA algorithm
Youlor/Youpk
又一款基于ART的主动调用的脱壳机
openstf/stf-appium-example
Run Appium test on OpenSTF Device
F8LEFT/FUPK3
演示视频https://pan.baidu.com/s/1HH_-TQGca1NLoSqzvOPB3Q 密码:izm3
hanbinglengyue/FART
ART环境下自动化脱壳方案
soot-oss/soot
Soot - A Java optimization framework
ysrc/obfuseSmaliText
smali文件,jar包字符串混淆,支持gradle插件
maiyao1988/deobf
An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler
WalterInSH/risk-management-note
🧯风险控制笔记,适用于互联网企业
threathunterX/nebula
"星云"业务风控系统,主工程
r0ysue/AndroidSecurityStudy
安卓应用安全学习
tiann/epic
Dynamic java method AOP hook for Android(continution of Dexposed on ART), Supporting 5.0~11