0xabe-io / syscall-hooks
☆12Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for syscall-hooks
- Cross Platform Hook Library based on Detours☆27Updated last month
- Shared Obfuscation Headers☆16Updated 5 years ago
- 修改版substrate Hook,使用源码编译成静态库☆13Updated 5 years ago
- Trace Log Generation (CLI) on a target device or emulator : Generating context information of every instruction from a specific point (in…☆21Updated 7 years ago
- elf loader implementation in rust☆13Updated 6 years ago
- A fork of Hikari's core obfuscation☆69Updated 4 years ago
- Code profiler based on Frida☆30Updated 3 years ago
- ☆16Updated 5 years ago
- Unicorn emulator plugin for Dwarf☆18Updated 5 years ago
- ☆21Updated 6 years ago
- based on llvm 5.0.1 release with ollvm☆37Updated 6 years ago
- CommentView 4 IDAPRO 7.0☆55Updated 4 years ago
- 白盒CLEFIA加密算法☆14Updated 8 years ago
- a android shared library dynamic loader☆17Updated 8 years ago
- IDA plugin CMake build-script☆38Updated 6 years ago
- android and linux injec& hook☆20Updated 8 years ago
- Quick and dirty hacks to explore ART internals☆11Updated 4 years ago
- Start method tracing using Android's internal APIs☆11Updated 6 years ago
- 执行引擎-Virtual Code Framework for V-CPU/VMProtect/ARM-Translator☆19Updated 4 years ago
- OLLVM_Deobfuscation 是一款ollvm反混淆工具,目前已经能完美实现x86架构Linux平台下,被ollvm混淆过的C/C++代码的反混淆,后续将逐步尝试Android SO文件的反混淆☆21Updated 7 years ago
- unpack UPX on android.☆35Updated 5 years ago
- read process memory with process_vm_readv☆17Updated 4 years ago
- Instrument code to trace memory☆19Updated 5 years ago
- ☆21Updated 6 years ago
- xnu-10.10 mach-o loader that compiles in userland☆17Updated 9 years ago
- A runtime patching library for Android.☆20Updated 7 years ago
- Convert machine code -> assembly code & assembly code -> machine code.☆19Updated 8 months ago
- do not debug me☆11Updated 5 years ago
- Python 3 bridge to IDA's Python environment☆16Updated 4 years ago
- A frida module to parse Elf headers in runtime☆31Updated 5 years ago