Skip to content
View Lerr1uqs's full-sized avatar
  • Beijing
  • 15:34 (UTC +08:00)

Block or report Lerr1uqs

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

一个小脚本,用于trace so中native函数的调用。

Python 574 150 Updated Aug 7, 2021

A mobile security risk control solution including an SDK and a management platform.

Java 202 47 Updated Apr 26, 2026

为 AI Agent 设计的 JS 逆向 MCP Server,内置反检测,基于 chrome-devtools-mcp 重构 | JS reverse engineering MCP server with agent-first tool design and built-in anti-detection. Rebuilt from chrome-devtools-mcp.

TypeScript 1,400 206 Updated May 18, 2026

基于Frida的脱壳工具

Python 1,587 337 Updated Jun 11, 2025

A command-line tool for downloading APK files from various sources

Rust 1,843 143 Updated May 4, 2026

Yet another llvm based obfuscator based on goron.

LLVM 241 50 Updated May 8, 2026

A community driven collection of IDA FLIRT signature files

Max 1,346 185 Updated Sep 3, 2021

The rust bindings for Unicorn Engine

Rust 16 7 Updated Feb 18, 2026
C 1,009 324 Updated May 7, 2021

exploit for CVE-2026-42945

Python 760 133 Updated May 13, 2026

ARM64 trace evidence analysis & cipher algorithm recovery — Claude Desktop plugin with skills + local MCP server driving the native ak_search engine over GB-scale trace files

Python 52 17 Updated May 14, 2026

Android ARM64 真机指令级 trace 全栈: Frida Stalker 采集 + Textual TUI 查看器 + AI 友好 query 接口. 实测稳跑 200 万+ 条 cold-path.

Rust 12 2 Updated May 15, 2026
Java 335 45 Updated May 13, 2026

AI-Powered Reverse Engineering Plugin for IDA Pro

Python 506 50 Updated May 20, 2026

主要针对移动安全中Android逆向工程师、漏洞挖掘工程师、渗透工程师的面试指南

110 21 Updated Sep 28, 2022

A Kernel based root solution for Android

Kotlin 16,530 3,479 Updated May 20, 2026

🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.

C++ 53,638 2,389 Updated May 20, 2026

LaST-R1

Python 81 4 Updated May 6, 2026
C 4,707 748 Updated May 10, 2026

🐛 A list of writeups from the Google VRP Bug Bounty program

Python 1,606 268 Updated May 13, 2026

Hex-Rays Microcode Viewer

Python 246 38 Updated Nov 13, 2022

Simple Android ARM&ARM64 GOT Hook

C++ 38 13 Updated Jun 8, 2022

Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)

C 8,973 1,495 Updated May 14, 2026

Hex-Rays microcode API plugin for breaking an obfuscating compiler

C++ 801 140 Updated Feb 22, 2021

Reverse engineering and pentesting for Android applications

Python 6,070 1,138 Updated Jan 12, 2026

Android Native Trace 与逆向分析工具,用于函数包装执行、指令跟踪、JNI 调用观测与外部跳转控制

C++ 66 25 Updated Apr 21, 2026

Dynamic injection tool for Linux/Android

Rust 213 18 Updated Dec 27, 2024

高性能 ARM64 执行 trace 可视化分析工具

Rust 348 123 Updated Apr 1, 2026

此项目分享安卓逆向的实战案例以及学习笔记,适合新手学习,随着作者逐渐变成大神,这个仓库也会适合大神学习~

Python 70 16 Updated Jul 11, 2024

通过内存特征检测frida

C++ 515 109 Updated Nov 5, 2019
Next