wdnmd's repositories
android-tool-stetho
Stetho is a debug bridge for Android applications, enabling the powerful Chrome Developer Tools and much more.
AndroidLayoutHelper
基于安卓accessibilityservice设计的查看控件布局的工具(附带一个按音量上下键刷抖音,自动刷抖音视频的案例)
Clash_For_Magisk
使用shell启动clash内核,以及创建iptables tproxy规则,以此在Android上达到透明代理的目的.
dpt-shell
Android函数抽取壳实现
dwm-screen-shot
将shellcode注入dwm.exe以进行屏幕截取
fake-linker
Modify Android linker to provide loading module and hook function
frida-android-unpinning
A Frida script to disable SSL certificate pinning in a target application
G37OBS
obs-studio plugin for csgo
hook-scanner
Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.
HwID-Kernel-Spoofer-Base-ImGui-UD-EAC-BE
This is a simple example in ImGui of a Kernel HwID Spoofer, currently UD on EAC and BE tested on Fortnite and Apex (10/01/2022)
icebox
Virtual Machine Introspection, Tracing & Debugging
llvmanalyzer
llvmanalyzer
loonix_syscall_hook
system call hooking on arm64 linux via a variety of methods
op7t
oneplus 7t 自定义内核(for 安卓逆向/外挂分析)
PADumper
Easy Dump ELF libil2cpp.so from Android Process Memory
PTEditor
A small library to modify all page-table levels of all processes from user space for x86_64 and ARMv8.
regenny
A reverse engineering tool to interactively reconstruct structures and generate header files
shellcode-factory
shellcode 生成框架
sigmakerex
IDA Pro signature tool
StrCrypt
Compile-time string crypter library for C++
tenet
A Trace Explorer for Reverse Engineers
TinyDBR
Tiny dynamic binary rewriter fox x86.
UE4Injector
Unreal Engine 4 vulnerability, that allows you to run shellcode directly into the target game process, to load any DLL undetected from most game anti cheats, such as Easy Anti Cheat, BattleEye, Ricochet, Vanguard, ATG, and more.
unicorn_peEmu
基于Unicorn仿真PE模拟