0xabe-io / syscall-hooks
☆12Updated 9 years ago
Alternatives and similar repositories for syscall-hooks:
Users that are interested in syscall-hooks are comparing it to the libraries listed below
- Shared Obfuscation Headers☆17Updated 5 years ago
- Code profiler based on Frida☆32Updated 4 years ago
- Trace Log Generation (CLI) on a target device or emulator : Generating context information of every instruction from a specific point (in…☆22Updated 8 years ago
- ☆21Updated 7 years ago
- 修改版substrate Hook,使用源码编译成静态库☆14Updated 6 years ago
- 参照着OLLVM写的一个混淆库,只要机器上有装LLVM,就可以直接编译拿来用☆53Updated 7 years ago
- c/c++ obfuscator with clang lib☆23Updated 7 years ago
- android and linux injec& hook☆20Updated 8 years ago
- based on llvm 5.0.1 release with ollvm☆37Updated 7 years ago
- Armariris由上海交通大学密码与计算机安全实验室维护的LLVM混淆框架——将Obfuscation pass有静态库修改为动态库☆12Updated 3 years ago
- ☆21Updated 7 years ago
- 修改Opcode有关,写入map文件时函数末尾数据暂时有问题☆15Updated 6 years ago
- some idapython scripts for android debugging.☆44Updated 7 years ago
- A fork of Hikari's core obfuscation☆72Updated 4 years ago
- Start method tracing using Android's internal APIs☆12Updated 7 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆38Updated 5 years ago
- Cross Platform Hook Library based on Detours☆32Updated 6 months ago
- a cute hook framwork(now for arm64)☆28Updated 7 years ago
- CommentView 4 IDAPRO 7.0☆55Updated 5 years ago
- LLVM Obfuscator☆47Updated 8 years ago
- OLLVM_Deobfuscation 是一款ollvm反混淆工具,目前已经能完美实现x86架构Linux平台下,被ollvm混淆过的C/C++代码的反混淆,后续将逐步尝试Android SO文件的反混淆☆21Updated 7 years ago
- Aims at providing a lightweight, highly cohesive and low coupling framework of useful cpp toolkit.☆37Updated 4 years ago
- unpack UPX on android.☆35Updated 5 years ago
- ☆21Updated 7 years ago
- Prebuilt binaries for Windows☆10Updated last year
- Rootkit。 进程监控。☆11Updated 8 years ago
- WIP☆14Updated 3 years ago
- JNI Helper for IDA 7.4+☆41Updated 7 months ago
- 软件保护及分析技术——原理与实践☆18Updated 7 years ago
- deobfuscation ollvm's fla☆67Updated 7 years ago