-
Cheng Du University of Technology
- China
- https://www.cnblogs.com/FW-ltlly/
Stars
A Binary Ninja plugin to identify interesting paths using static backward slicing
Inject faults by specifying the address of the T-box or Tyibox in the white-box AES.
Assets for the "Tickling VMProtect with LLVM" blog post.
The most advanced browser fingerprinting library.
A Dynamic Binary Instrumentation framework based on LLVM.
An assortment of helpers that I've found to be useful when writing Binary Ninja plug-ins in Rust
Visualise the Data Flow Graph of the PCODE at all stages in the decompilation process
A collection of over 200 Ghidra themes to make long hours of reverse-engineering even more enjoyable!
Binary Ninja plugin to analyze and simplify obfuscated code
🔥🔥 hooker is a Frida-based reverse engineering toolkit for Android. It offers a user-friendly CLI, universal scripts, auto hook generation, memory roaming to detect activities/services, one-click S…
获取设备标识(widevineId/instanceId/androidId/oaid),采集设备信息。
安卓设备唯一标识解决方案,可替代移动安全联盟(MSA)统一 SDK 闭源方案。包括国内手机厂商的开放匿名标识(OAID)、海外手机平台的安卓广告标识(AAID),另外也提供了 IMEI/MEID、AndroidID、WidevineID、PseudoID、GUID 等常见的设备标识的获取方法。
Google H*ck is a module designed to bypass play integrity checks, especially for China Roms, and offers advanced configuration and development capabilities.
A library for recording arbitrary calls to Python modules, primarily intended for Python reverse engineering and analysis. 记录任意对Python模块的调用的库,主要用于Python逆向分析。
An advanced Kernel based root solution for Android
This is @Perfare 's Modified version of il2cppDumper (GUI) for Android
Python decompiler for modern Python versions.