AeonLucid / frida-syscall-interceptor
☆153Updated 5 years ago
Alternatives and similar repositories for frida-syscall-interceptor:
Users that are interested in frida-syscall-interceptor are comparing it to the libraries listed below
- smali trace☆163Updated 2 years ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆229Updated 4 years ago
- this is frida trace assemble and register change tools☆155Updated last year
- Common IDA scripts for effective Reverse Enginnering☆170Updated 2 years ago
- ☆118Updated 3 years ago
- 破解聚安全无线保镖sgavmp相关框架☆127Updated 4 years ago
- android memory access trace utility powered by frida framework☆235Updated 2 years ago
- Reverse libsgmain 聚安全sgmain逆向☆106Updated 4 years ago
- ☆115Updated 2 years ago
- deobfuscator llvm arm64 script☆90Updated 5 years ago
- Instructions tracing powered by frida☆178Updated 5 years ago
- strongR-frida☆200Updated 3 years ago
- Instruction tracer powered by Frida☆135Updated 2 months ago
- ☆324Updated 10 months ago
- ☆337Updated 2 years ago
- ART tracing research☆89Updated 2 years ago
- Automatically de-obfuscate ollvm and generate binaries☆107Updated 3 years ago
- ☆115Updated 3 years ago
- Android system call hook☆191Updated 2 months ago
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆231Updated 2 years ago
- Seccomp + Signal Intercept SVC☆90Updated last year
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆162Updated 9 months ago
- unidbg支持Android arm32 多线程☆72Updated 4 years ago
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆149Updated 3 months ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆61Updated 2 years ago
- Jnitrace for cpp☆268Updated 11 months ago
- ☆70Updated 3 months ago
- a few android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog☆114Updated 2 months ago
- 安卓绕过ptrace反调试☆70Updated 4 years ago
- IDA Python Script for anti ollvm☆102Updated 3 years ago