3intermute / arm64_silent_syscall_hook
silent syscall hooking without modifying sys_call_table/handlers via patching exception handler
☆127Updated 10 months ago
Alternatives and similar repositories for arm64_silent_syscall_hook:
Users that are interested in arm64_silent_syscall_hook are comparing it to the libraries listed below
- system call hooking on arm64 linux via a variety of methods☆47Updated 2 years ago
- ☆56Updated 2 years ago
- Kernel mode to user mode so injection☆86Updated 4 years ago
- 去除BR混淆 Deobfuscation BR☆73Updated 9 months ago
- A kernel module to read and write memory in a remote process.☆56Updated 6 months ago
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆34Updated 10 months ago
- A zygisk module that dumps so file from process memory☆49Updated 5 months ago
- Inject shared libraries into processes on Android (real/emulator device supported)☆95Updated 10 months ago
- A rootkit for Android.☆52Updated 9 months ago
- Injecting into SELinux-protected system service processes under root on Android.☆39Updated last year
- Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBA☆125Updated last year
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆48Updated 10 months ago
- 内核硬件调试器模块,rootkit操作 dump☆34Updated 3 years ago
- 本工具用于解决ollvm编译出来的Linux驱动文件,加载进内核会报错“please compile with -fno-common”的问题☆31Updated 3 years ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆70Updated last year
- AntiOllvm Fla with Fake Runtime☆149Updated 2 months ago
- tprt ollvm 反混淆 修改 binja il☆38Updated 6 months ago
- linux kernel inline hook☆122Updated 2 years ago
- 跨平台模拟执行unicorn框架基于Qemu的TCG模式(Tiny Code Generator),以无硬件虚拟化支持方式实现全系统的虚拟化,支持跨平台和架构的CPU指令模拟,本文讨论是一款笔者的实验性项目采用Windows Hypervisor Platform虚拟机模式…