AeonLucid / ArtourLinks
Android ART hooking native library supporting Android 5.0 to 10.0
☆20Updated 5 years ago
Alternatives and similar repositories for Artour
Users that are interested in Artour are comparing it to the libraries listed below
Sorting:
- A frida module to parse Elf headers in runtime☆35Updated 5 years ago
- ☆32Updated 5 years ago
- Start method tracing using Android's internal APIs☆13Updated 7 years ago
- Utility to read custom structure from Tencent's libshell packer☆38Updated 6 years ago
- JNI Helper Plugin☆53Updated 6 months ago
- Some 'one-line' frida api to avoid code recycling here and there☆28Updated 5 years ago
- IDA plugin aid to set android so breakpoint☆32Updated 7 years ago
- read process memory with process_vm_readv☆16Updated 5 years ago
- unpack UPX on android.☆35Updated 6 years ago
- rewrite dex file☆42Updated 3 years ago
- Frida module utils, writen in typescript☆16Updated last year
- substrate framework for android based on frida☆16Updated 5 years ago
- ☆18Updated 3 years ago
- ☆31Updated 3 years ago
- Update Frida hooks automatically.☆27Updated last year
- 娜迦DEX文件修复程序☆25Updated 7 years ago
- ☆18Updated 5 years ago
- 修改Opcode有关,写入map文件时函数末尾数据暂时有问题☆15Updated 7 years ago
- ☆32Updated last week
- JNI Helper for IDA 7.4+☆42Updated 10 months ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- ☆13Updated 4 years ago
- Android rootkit☆41Updated 9 years ago
- ☆15Updated 3 years ago
- Android-Syscall-Logger☆22Updated 4 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 7 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆29Updated 5 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆16Updated 5 years ago
- Android Injector☆23Updated 8 years ago