Shadowxiaomo's repositories
find_string_xref
使用capstone编写的寻找elf文件字符串交叉引用的简单脚本
Android-Disassembler
Disassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as pictures, audios, etc(for fun)files on Android. Capstone-based disassembler application on android. 안드로이드 NDK 공유 라이브러리, Windows 바이너리, etc,... 리버싱 앱
Stark
Repository of small utilities related to key recovery
GoGoGo
一个基于 Android 调试 API + 百度地图实现的虚拟定位工具,并且同时实现了一个可以自由移动的摇杆
blutter
Flutter Mobile Application Reverse Engineering Tool
NodeSandbox
Node补环境框架
nativeLib
common nativeLib libraries
Android_CN_OAID
安卓设备唯一标识解决方案,可替代移动安全联盟(MSA)统一 SDK 闭源方案。包括国内手机厂商的开放匿名标识(OAID)、海外手机平台的安卓广告标识(AAID),另外也提供了 IMEI/MEID、AndroidID、WidevineID、PseudoID、GUID 等常见的设备标识的获取方法。
decode-js
JS混淆代码的AST分析工具 AST analysis tool for obfuscated JS code
unpacker-panel
基于Youpk脱壳机的一键脱壳Web面板
Memory-dump-dll
使用frida搜索内存中的dll后将其dump下
Akira-obfuscator
Another LLVM-obfuscator based on LLVM-17. A fork of Arkari
dexfixer
修复fart脱出来的结果
Frida-Labs
The repo contains a series of challenges for learning Frida for Android Exploitation.
AndKittyInjector
Inject a shared library into a process using ptrace
uEmu
Tiny cute emulator plugin for IDA based on unicorn.
unidbg-boot-server
unidbg-server 提供http api服务
JeanGrey
Tools to perform differential fault analysis attacks (DFA).
IDAFrida
IDA Frida Plugin for tracing something interesting.
MobileSec
记录一些我自己在学习Android逆向过程中的有意思的东西
JnitraceForCpp
Jnitrace for cpp
AndroidReverseStudy
安卓逆向学习
MikRom
ROM逆向工具