AeonLucid / frida-syscall-interceptorLinks
☆156Updated 5 years ago
Alternatives and similar repositories for frida-syscall-interceptor
Users that are interested in frida-syscall-interceptor are comparing it to the libraries listed below
Sorting:
- Common IDA scripts for effective Reverse Enginnering☆174Updated 2 years ago
- android memory access trace utility powered by frida framework☆242Updated 3 years ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆232Updated 4 years ago
- this is frida trace assemble and register change tools☆162Updated last year
- ☆121Updated 2 years ago
- smali trace☆178Updated 3 years ago
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆239Updated 2 years ago
- Reverse libsgmain 聚安全sgmain逆向☆107Updated 5 years ago
- 破解聚安全无线保镖sgavmp相关框架☆132Updated 5 years ago
- ☆122Updated 4 years ago
- Instruction tracer powered by Frida☆140Updated 2 months ago
- ☆122Updated 3 years ago
- Instructions tracing powered by frida☆178Updated 6 years ago
- ☆344Updated last year
- strongR-frida☆215Updated 4 years ago
- Seccomp + Signal Intercept SVC☆89Updated 2 years ago
- deobfuscator llvm arm64 script☆95Updated 5 years ago
- a few android analysis tools, jni trace by native hook, Java Object Format to Json for Xposed and Frida☆152Updated 3 weeks ago
- 一个基于ptrace-seccomp简单的重定向openat的demo☆77Updated 2 years ago
- IDA Python Script for anti ollvm☆106Updated 3 years ago
- Engine used by jnitrace to intercept JNI API calls.☆324Updated 2 years ago
- monitor svc calls of android☆73Updated 6 years ago
- Android system call hook☆216Updated 7 months ago
- unidbg支持Android arm32 多线程☆72Updated 4 years ago
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆205Updated 4 months ago
- ☆84Updated 8 months ago
- 安卓绕过ptrace反调试☆72Updated 4 years ago
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆197Updated 3 months ago
- ART tracing research☆91Updated 2 years ago
- ☆377Updated 2 years ago