-
Beijing institute of technology
- Beijing
Stars
[🔥updating ...] AI 自动量化交易机器人(完全本地部署) AI-powered Quantitative Investment Research Platform. 📃 online docs: https://ufund-me.github.io/Qbot ✨ :news: qbot-mini: https://github.com/Charmve/iQuant
Collection of Some Publically Available POC Apps to Detect Root/Magisk presence.
FridaContainer 整合了网上流行的和自己编写的常用的 frida 脚本,为逆向工作提效之用。 frida 脚本模块化,Java & Jni Trace。
Android background process keep-alive, prevent uninstallation, anti-uninstall, background pop-up activity. The latest Android high-availability black-tech application keep-alive for 2024, achieving…
Single-step debugging of native code using frida, stalker, and semaphore
TinyMagicka / FridaDebugger
Forked from axhlzy/FridaDebuggerSingle-step debugging of native code using frida, stalker, and semaphore
The patching of Android kernel and Android system
Test to build a multi-platforms Native Python 3 package using pip
UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities
Android ART Hook/Native Inline Hook/Single Instruction Hook - support 4.4 - 11.0 32/64 bit - Xposed API Compat
Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker
Dynamic java method AOP hook for Android(continution of Dexposed on ART), Supporting 5.0~11
SsageParuders / CvmSeccomp
Forked from Ccccccccvvm/CvmSeccompSeccomp + Signal Intercept SVC
Dynamic java method hook framework on ART. Allowing you to change almost all java methods' behavior dynamically.
新一代SKRoot,挑战全网root检测手段,跟面具完全不同思路,摆脱面具被检测的弱点,完美隐藏root功能,全程不需要暂停SELinux,实现真正的SELinux 0%触碰,通用性强,通杀所有内核,不需要内核源码,直接patch内核,兼容安卓APP直接JNI调用,稳定、流畅、不闪退。
一个Android通用svc跟踪以及hook方案——Frida-Seccomp
TinyMagicka / camille
Forked from zhengjim/camille基于Frida的Android App隐私合规检测辅助工具
An android Dex protects shell implementation
AndroidIDE is an IDE for Android to develop full featured Android apps.
An improved version of AndroidNativeEmu,Allow running android elf on PC
MODeflattener deobfuscates control flow flattened functions obfuscated by OLLVM using Miasm.
天问之路 - 学习笔记&学习周报。内容包括但不限于C++ STL、编译原理、LLVM IR Pass代码优化、CSAPP Lab、uCore操作系统等等。
Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)