Skip to content
View focuspadding's full-sized avatar

Block or report focuspadding

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

📱AndroidSecurity

270 repositories

🔥🔥hooker是一个基于frida实现的逆向工具包。为逆向开发人员提供统一化的脚本包管理方式、通杀脚本、自动化生成hook脚本、内存漫游探测activity和service、firda版JustTrustMe、disable ssl pinning

JavaScript 3,751 939 Updated May 25, 2024

记录一些我自己在学习Android逆向过程中的有意思的东西

JavaScript 778 203 Updated Sep 11, 2023

Generic Script To Bypass Some AntiFrida Checks

JavaScript 403 113 Updated Sep 12, 2024

Decompiled /values from various MIUI / HyperOS ROMs.

24 12 Updated Nov 11, 2024

ROM逆向工具

Java 585 218 Updated Mar 12, 2024

魔改sandhook特征,MikRom注入dex实现免root的xposed案例

Java 35 19 Updated Mar 15, 2022

Syscall table hook frame in Android kernel for arm and arm64

Batchfile 78 38 Updated May 29, 2017

Advanced Game Hacking Library for C, Modern C++, Rust and Python (Windows/Linux/FreeBSD) (Process/Memory Hacking) (Hooking/Detouring) (Cross Platform) (x86/x64) (DLL/SO Injection) (Internal/Externa…

C 815 98 Updated Oct 13, 2024

⚡️ 史上最强安卓抓包/逆向/HOOK & 云手机/远程桌面/自动化取证 ALL-IN-ONE,安卓 RPA 机器人框架,下一代移动端数据自动化机器人。

Python 6,142 857 Updated Nov 10, 2024

对于目前主流android逆向工具的检测

C 100 32 Updated Sep 6, 2022

Linux ARM64内核硬件进程内存读写驱动、硬件断点调试驱动。硬件级读写Linux进程内存、硬件级下断点。

C 654 297 Updated Aug 6, 2024

Xiaomi Mobile Phone Kernel OpenSource

8,726 3,218 Updated Nov 4, 2024

Android application hooking tool based on FastHook + VirtualApp

Java 175 77 Updated Mar 25, 2019

Android虚拟化研究

39 28 Updated Jun 16, 2021

鹏城实验室与北弓联合开发的VMI开源版本

C++ 230 78 Updated May 12, 2022

Android system based on container technology (eg: lxc, docker, cells)

C 37 32 Updated Oct 31, 2021

ExStudPE Visual Tools 是一个扩展StudPE、LordPE等软件的用于PE(32位)、PE+(64位)、NE、Elf(32位)、Coff、Lib格式二进制可执行目标文件(*.exe、*.dll、*.ocx、*.so、*.lib、*.obj、*.exp等)的分析、调试、十六进制编辑工具。 利用此工具可以方便的查找给定PE文件的一些常用的信息,如导入表、导出表、重定位表、资…

C++ 50 12 Updated May 11, 2020

An anti detection version frida-server for android.

531 570 Updated Oct 14, 2024

chroot, mount --bind, and binfmt_misc without privilege/setup for Linux

C 2,023 378 Updated Aug 15, 2024

Rust implementation of PRoot, a ptrace-based sandbox

Rust 129 21 Updated Jan 27, 2023

rom逆向工具ui管理

Java 187 96 Updated Jun 22, 2022
Python 297 115 Updated May 8, 2024

this is frida trace assemble and register change tools

JavaScript 147 39 Updated Oct 14, 2023

Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android

YARA 2,063 296 Updated Nov 11, 2024

基于Frida的Android App隐私合规检测辅助工具

JavaScript 1,514 252 Updated Jul 21, 2023

Deobfuscator for Android Application

C++ 406 56 Updated Jun 16, 2022

一个小脚本,用于trace so中native函数的调用。

Python 469 142 Updated Aug 7, 2021

一个Android通用svc跟踪以及hook方案——Frida-Seccomp

JavaScript 547 155 Updated May 14, 2024

Is a protect Android App anti any attacks and environments.

C++ 325 100 Updated Dec 28, 2023

安卓中进程注入

C 4 1 Updated Mar 29, 2021