AeonLucid / frida-syscall-interceptor
☆148Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for frida-syscall-interceptor
- this is frida trace assemble and register change tools☆147Updated last year
- smali trace☆144Updated 2 years ago
- android memory access trace utility powered by frida framework☆228Updated 2 years ago
- ☆107Updated 3 years ago
- ☆110Updated last year
- ☆297Updated 6 months ago
- Common IDA scripts for effective Reverse Enginnering☆157Updated last year
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆225Updated 4 years ago
- Instructions tracing powered by frida☆174Updated 5 years ago
- 破解聚安全无线保镖sgavmp相关框架☆126Updated 4 years ago
- Reverse libsgmain 聚安全sgmain逆向☆99Updated 4 years ago
- strongR-frida☆194Updated 3 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆140Updated 5 months ago
- ☆310Updated last year
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆97Updated 4 months ago
- deobfuscator llvm arm64 script☆88Updated 5 years ago
- oneplus 7t 自定义内 核(for 安卓逆向/外挂分析)☆222Updated last year
- ☆110Updated 2 years ago
- ☆69Updated 2 years ago
- Seccomp + Signal Intercept SVC☆88Updated last year
- Instruction tracer powered by Frida☆132Updated last year
- Jnitrace for cpp☆252Updated 7 months ago
- 安卓绕过ptrace反调试☆67Updated 3 years ago
- IDA Python Script for anti ollvm☆98Updated 3 years ago
- a few android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog☆106Updated 6 months ago
- monitor svc calls of android☆72Updated 6 years ago
- ☆150Updated 4 years ago
- Automatically de-obfuscate ollvm and generate binaries☆101Updated 2 years ago