3intermute / arm64_silent_syscall_hookLinks
silent syscall hooking without modifying sys_call_table/handlers via patching exception handler
☆134Updated last year
Alternatives and similar repositories for arm64_silent_syscall_hook
Users that are interested in arm64_silent_syscall_hook are comparing it to the libraries listed below
Sorting:
- ☆58Updated 3 years ago
- Kernel mode to user mode so injection☆91Updated 4 years ago
- A rootkit for Android.☆54Updated last year
- system call hooking on arm64 linux via a variety of methods☆50Updated 3 years ago
- 去除BR混淆 Deobfuscation BR☆77Updated last year
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆39Updated last year
- A kernel module to read and write memory in a remote process.☆63Updated 11 months ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆52Updated last year
- 内核硬件调试器模块,rootkit操作 dump☆35Updated 3 years ago
- tprt ollvm 反混淆 修改 binja il☆44Updated 11 months ago
- 本工具用于解决ollvm编译出来的Linux驱动文件,加载进内核会报错“please compile with -fno-common”的问题☆37Updated 4 years ago
- GitHub Actions to analyse file using IDA☆30Updated 8 months ago
- Inject shared libraries into processes on Android (real/emulator device supported)☆104Updated last year
- linux kernel inline hook☆133Updated 2 years ago
- A simple android utility for inject so (suport arm, aarch64)☆28Updated 2 years ago
- ☆17Updated last year
- Android AntiCheat☆45Updated 3 years ago
- System Call Hook for ARM64☆165Updated last month
- 自實現Linker的小Demo☆70Updated 2 months ago
- Frida's setHardwareWatchpoint tutorial☆52Updated 9 months ago
- AntiOllvm Fla with Fake Runtime☆170Updated 6 months ago
- 使用 frida stalker 实现的 trace☆29Updated 2 years ago
- LLVM Obfuscation Pass☆20Updated 8 months ago
- Injecting into SELinux-protected system service processes under root on Android.☆45Updated last year
- IDA Python Script for anti ollvm☆106Updated 3 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆80Updated 9 months ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆62Updated 8 months ago
- Android assembly instruction tracing tool☆98Updated 3 months ago
- 利用ptrace,通过ptrace修改PC寄存器调用dlopen/dlsym或者在shellcode中调用dlopen/dlsym☆29Updated 6 years ago
- LLVM PASS by SsageParuders.Port to llvm_14.06 with New PM.Support for Android-ndk-r25(LTS).☆168Updated 2 years ago