之前梳理的思维导图
参考:https://github.com/houjingyi233/how-to-Study-Android-Security
以下为整理自己star过的android安全的内容
- [Android Devoloper](#Android Devoloper)
- [Android Reverse-Engineering Tools](#Android Reverse-Engineering Tools)
- [Android Hook](#Android Hook)
- [Android Classloader](#Android Classloader)
- [Android Obfuscate](#Android Obfuscate)
- [Android deobfuscated ](#Android deobfuscated )
- [Android Packer](#Android Packer)
- [Android UnPacker](#Android UnPacker)
- [Android Anti-Emulator](#Android Anti-Emulator)
- [Android Vulnerability](#Android Vulnerability)
- [Malware Analysis System](#Malware Analysis System )
- CTF
- [Software development](#Software development )
- Vulnerability-Research
- Fuzz
- [Computer Basic](#Computer Basic )
- Andriod-collect-blogs
- AppLock应用程序锁
- Implementation of Android views that detect screen overlays
- ADB用法大全
- NDK实现AES/DES
- Java版xposed安卓防撤回插件
- Kotlin编写的xposed安卓防撤回插件
- Penetration testing and auditing toolkit for Android apps.
- 针对Android Studio的源码扫描工具
- IDA plugins
- parse, modify and abstract ELF
- Identifying/Extracting various sections of an ELF file
- how to start RE
- Android SO自动化分析工具
- Dump Android Verified Boot Signature
- Xposed免重启模块
- Xposed调试框架
- Android inline hook
- Android通用hook
- Frida教程
- zygote_hook in Android6.0
- Inject code to process memory, link it and run in a separate thread.
- Android Kernel Exploit
- VIKIROOT
- An overlay attack example
- StartActivityCheck
- eled7大佬的poc
- offensive的poc
- jayy大佬的poc
- CTF
- Protostar-CTF-Python-write-up
- awesome-mobile-ctf
- CTF博客+教程
- CTF-pwn-tips
- Very vulnerable ARM application (CTF style exploitation tutorial)
- Python-Guide-CN
- Python-Programs
- A Powerful Spider(Web Crawler) System in Python.
- Awesome-C-CN
- metasploit-framework
- fun-with-native-code
- Awesome-Mac