wanchouchou's repositories
AndroidNativeDebug
a python script for debugging the Android Native Share library.
AuditDroid
AduitDroid
HexRaysDeob
Hex-Rays microcode API plugin for breaking an obfuscating compiler
VirtualApp
An open source implementation of MultiAccount.(Support 4.0 - N).
1book
《Web安全之机器学习入门》
Android-Inline-Hook
thumb16 thumb32 arm32 inlineHook in Android
arm-thumb-decompiler-plugin
Automatically exported from code.google.com/p/arm-thumb-decompiler-plugin
avmdbg
a lightweight debugger for android virtual machine.
awesome-sec-talks
A collected list of awesome security talks
dex-oracle
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
DroidPlugin
A plugin framework on android,Run any third-party apk without installation, modification or repackage
ghidra
Ghidra is a software reverse engineering (SRE) framework
ida_ea
A set of exploitation/reversing aids for IDA
legend
A framework for hook java methods.
lobotomy
Android Reverse Engineering Framework & Toolkit
panda
Platform for Architecture-Neutral Dynamic Analysis
restore-symbol
A reverse engineering tool to restore stripped symbol table for iOS app.
Review_Reverse
:wave:2019年末总结下今年做过的逆向,整理代码,复习思路。:pray:拼夕夕Web端anti_content参数逆向分析:japanese_goblin: WEB淘宝sign逆向分析;:smiley_cat:努比亚Cookie生成逆向分析;:raised_hands:百度指数data加密逆向分析 :footprints:今日头条WEB端_signature、as、cp参数逆向分析:notes:知乎登录formdata加密逆向分析 :clown_face:KNN猫眼字体反爬:tongue:Boss直聘Cookie加密字段__zp_stoken__逆向分析
security-notes
:notebook: Some security related notes
self-compile-Android
Autonomous smartphone app. Capable of self-compilation, mutation, and viral spreading. World-first proof-of-principle to bypass Internet kill switches.
tensorflow-internals
It is open source ebook about TensorFlow kernel and implementation mechanism.
uEmu
Tiny cute emulator plugin for IDA based on unicorn.
USTC-CS-Courses-Resource
:heart:**科学技术大学计算机学院课程资源(https://mbinary.xyz/ustc-cs/)
wooyun-drops-all-articles-package
wooyun drops all article package
zerodb
ZeroDB is an end-to-end encrypted database. Data can be stored on untrusted database servers without ever exposing the encryption key. Clients can execute remote queries against the encrypted data without downloading all of it or suffering an excessive performance hit.