-
Shanghai Jiao Tong University
- Shanghai
Stars
Pure-JS bindings to control Frida from node.js & browsers
Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arbitrary Code Execution Vulnerability
Tiny cute emulator plugin for IDA based on unicorn.
📡 PoC auto collect from GitHub.
零知识证明入门教程。Comprehensive Zero-Knowledge Proofs Tutorial. #zk #WIP
Modify framework.jar to build on system level a valid certificate chain
eBPF Developer Tutorial: Learning eBPF Step by Step with Examples
Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.
PLCT实验室维护的ollvm分支。原始代码来自于 https://github.com/obfuscator-llvm/obfuscator 移植到了最新的 LLVM 上。
Allows you to emulate an Android native library, and an experimental iOS emulation
Code repository for Hacking Andriod, published by Packt
Linux ARM64内核硬件进程内存读写驱动、硬件断点调试驱动。硬件级读写Linux进程内存、硬件级下断点。
一个好用的哔哩哔哩漫画下载器,拥有图形界面,支持关键词搜索漫画和二维码登入,黑科技下载未解锁章节,多线程下载,多种保存格式,本地漫画管理,一键检查更新!