huaerxiela's starred repositories
obfuscator
ollvm,base on llvm-clang 5.0.2, 6.0.1 , 7.0.1,8.0,9.0,9.0.1,10.x,11.x,12.x,13.x,14.x,swift-llvm-clang 5.0,swift-llvm-clang 5.5
coffeecatch
CoffeeCatch, a tiny native POSIX signal catcher (especially useful for JNI code on Android/Dalvik)
Android-Vulnerability-Mining
Android APP漏洞之战系列,主要讲述如何快速挖掘APP漏洞
js-cookie-monitor-debugger-hook
js cookie逆向利器:js cookie变动监控可视化工具 & js cookie hook打条件断点
magisk_All
magisk 一键集成环境,再也不用每次刷完机繁琐的配置环境了!
js-deobfuscator
js 代码反混淆
interruptor
Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker
mipay-extract
Extract Mi Pay from MIUI China Rom
llvm-pass-tutorial
A step-by-step tutorial for building an LLVM sample pass
MagiskKiller
Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.
arm64_silent_syscall_hook
silent syscall hooking without modifying sys_call_table/handlers via patching exception handler
OpenVirtualApp
A virtualapp source code project by EA-Reopen.
Frida-Detection
Small Apps As PoC to Detect Frida With Frida
linux_syscall_hook
system call hooking on arm64 linux via a variety of methods
MikSandHook
魔改sandhook特征,MikRom注入dex实现免root的xposed案例
SharkInject
android8 arm64 注入方案
page-redirect-code-location-hook
JS逆向技巧:页面跳转JS代码定位通杀方案
linux_kernel_rootkit
编写一个简单的linux kernel rootkit
MikRomInjectDemo
注入so使用dobby的demo
PShocker.github.io
博客地址:https://pshocker.github.io/