Abbbbbi / Frida-SeccompLinks
一个Android通用svc跟踪以及hook方案——Frida-Seccomp
☆647Updated last year
Alternatives and similar repositories for Frida-Seccomp
Users that are interested in Frida-Seccomp are comparing it to the libraries listed below
Sorting:
- 一个小脚本,用于trace so中native函数的调用。☆569Updated 4 years ago
- 利用 frida 获取 Jni RegisterNatives 动态注册的函数☆351Updated 2 years ago
- 通过内存特征检测frida☆510Updated 6 years ago
- ☆376Updated last year
- ☆416Updated 2 years ago
- ☆958Updated 4 years ago
- 一个IDA脚本,可以检测出哈希算法(无论是否魔改常数)并生成frida hook 代码。☆441Updated 4 years ago
- Jnitrace for cpp☆307Updated last year
- 整理一些unidbg常用的工具在这里☆352Updated 3 years ago
- 在FART的基础上进行优化。实现更深的主动调用。适用AOSP10☆262Updated 4 years ago
- 基于xposed的frida持久化方案☆351Updated 4 years ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆477Updated 5 years ago
- 基于eBPF的syscall追踪工具,适用于安卓平台☆324Updated 2 years ago
- Android 加固应用Hook方式-Frida☆288Updated 3 years ago
- strongR-frida☆223Updated 4 years ago
- Frida持久化解决方案☆407Updated 3 years ago
- ROM逆向工具☆654Updated last year
- vmtrace的发布仓库,相关so 调用脚本例子都会放在里面☆535Updated last month
- an android method tracer gui tool base-on frida☆476Updated 6 years ago
- Allows you to partly emulate an Android native library.☆361Updated 5 years ago
- android memory access trace utility powered by frida framework☆246Updated 3 years ago
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆275Updated 8 months ago
- 在FART的基础上进行优化。实现更深的主动调用。适用AOSP10☆207Updated 4 years ago
- An OLLVM-CFF Deobfuscation Plugin☆627Updated 2 years ago
- 简悦导入文章☆399Updated this week
- Engine used by jnitrace to intercept JNI API calls.☆330Updated 2 years ago
- ☆239Updated 4 years ago
- An improved version of AndroidNativeEmu,Allow running android elf on PC☆699Updated 2 years ago
- ☆386Updated 10 months ago
- 梆梆企业加固详细逆向分析过程, 包含两种对该加固的脱壳机(直接解密classes0.jar和基于frida hook)☆476Updated 6 years ago