5ec1cff / ptrace-examples
https://github.com/5ec1cff/my-notes/blob/master/ptrace.md
☆19Updated last year
Alternatives and similar repositories for ptrace-examples:
Users that are interested in ptrace-examples are comparing it to the libraries listed below
- ☆20Updated 8 months ago
- A zygisk module that hooks `libdexfile.so` to dump dex☆41Updated 2 months ago
- Remap a library to avoid detection☆101Updated last year
- Zygisk module template.☆23Updated 9 months ago
- vApp-Inject is a Virtual Box application project designed to provide users with the ability to run Android games and apps independently w…☆21Updated 9 months ago
- A minimalistic Xposed framework which is based on LSPlant.☆32Updated 2 years ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆16Updated 9 months ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆58Updated 2 years ago
- An adbd extension used for adb root and shell replacement.☆45Updated 8 months ago
- Inotify监听测试☆33Updated 2 years ago
- A zygisk module loads frida-gadget☆22Updated 4 months ago
- Run `strace` on program that is under another debugger☆17Updated last year
- Simple frida anti-detection patch☆29Updated last year
- A demo app to detect Zygote injections☆60Updated this week
- Loading ELF in android using pure java / 使用纯 java 在 android 上加载 ELF☆33Updated 2 months ago
- A kernel module for protecting android rooted device☆32Updated last year
- zygisk插件:用于unity游戏hook☆16Updated 2 years ago
- Draw on Canvas based Overlay with RootService☆19Updated 10 months ago
- AndroidInject bypass check☆16Updated 9 months ago
- 转换Pxx的vmp文件(check.bin, mw.bin)到.class☆28Updated last year
- frida runtime resolves smali☆80Updated 3 months ago
- ☆26Updated last month
- 个人专用 ONEPLUS 5 内核,做了一些 基础的反调试修改(从 maps 隐藏特定 lib,最完整最正常的 tracerPid 修改措施)☆79Updated 3 years ago
- Capture input events of any android application☆41Updated 8 months ago
- An Android Injector aimed to inject through Virtual Space without root permissions☆121Updated 3 weeks ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆53Updated 2 months ago
- 来自大表哥的剑☆24Updated 5 years ago
- This is a xposed module showing how to hook java and native code.☆10Updated 3 years ago
- 注入so使用dobby的demo☆18Updated 2 years ago