3intermute / linux_syscall_hook
system call hooking on arm64 linux via a variety of methods
☆41Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for linux_syscall_hook
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆118Updated 7 months ago
- tprt ollvm 反混淆 修改 binja il☆34Updated 2 months ago
- linux x86_64 and arm64 syscall hook☆17Updated 11 months ago
- In-memory ELF shared library loading☆37Updated last year
- 详细说明及演示MMU相关原理及过程(用于理解Linux内核Root Kernelpatch)☆20Updated 5 months ago
- 本工具用于解决ollvm编译出来的Linux驱动文件,加载进内核会报错“please compile with -fno-common”的问题☆30Updated 3 years ago
- ida 对抗 花指令, 基于 ida 7.5 sdk 编写☆17Updated 10 months ago
- A simple android utility for inject so (suport arm, aarch64)☆24Updated last year
- ☆15Updated 3 years ago
- libEncryptor vm 还原的分享☆52Updated last month
- A rootkit for Android.☆44Updated 5 months ago
- A Project for people to study android svc.☆24Updated 2 years ago
- 使用 frida stalker 实现的 trace☆21Updated last year
- A zygisk module that dumps so file from process memory☆37Updated last month
- deobfuscation BR☆36Updated 8 months ago
- Android Overlay Hijack☆19Updated 2 months ago
- 内核硬件调试器模块,rootkit操作 dump☆31Updated 2 years ago
- Format the tcg log for qemu and present it in a more intuitive form☆12Updated last year
- A kernel module for tracing signal☆24Updated last year
- ☆59Updated last year
- GitHub Actions to analyse file using IDA☆21Updated this week
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆25Updated 4 years ago
- 自實現Linker的小Demo☆53Updated 4 months ago
- 反ida内联汇编花指令☆49Updated last year
- hwBreakpoint Test App☆16Updated 2 years ago
- try try full features ebpf on android without Pixel 6☆21Updated 2 years ago
- ☆29Updated 2 years ago
- Deobfuscate OLLVM Bogus Control Flow via angr☆62Updated 2 years ago
- deobf tx libtprt's obfuscation☆35Updated 3 months ago