Anonymous941 / zygote-injection-toolkitLinks
A command-line utility to exploit Android Zygote injection (CVE-2024-31317)
☆44Updated last month
Alternatives and similar repositories for zygote-injection-toolkit
Users that are interested in zygote-injection-toolkit are comparing it to the libraries listed below
Sorting:
- A demo app to detect Zygote injections☆109Updated last month
- A zygisk module that hooks `libdexfile.so` to dump dex☆141Updated last month
- A header-only C++ library that makes working with the Java Native Interface (JNI) safer and more convenient.☆103Updated 10 months ago
- A POC to detect zygisk☆70Updated 7 months ago
- with this repo you can bypass libpairipcore tamper and signature protection☆48Updated 8 months ago
- Android aarch64 kernel rootkit(driver module)☆126Updated last month
- frida runtime resolves smali☆91Updated 8 months ago
- An Android Injector aimed to inject through Virtual Space without root permissions☆178Updated last year
- A Xposed-like library for runtime Java method interception in OpenJDK VM.☆76Updated 4 months ago
- Android IO redirection implementation, using seccomp user notify mechanism / 使用 seccomp unotify 的 Android 文件重定向实现☆66Updated 2 months ago
- Remap a library to avoid detection☆130Updated last year
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆82Updated 3 years ago
- Simple frida anti-detection patch☆52Updated 10 months ago
- CVE-2025-21479 proof-of-concept, I think☆186Updated 5 months ago
- 内核驱动开发工具包 (Kernel Driver Development Kit)☆91Updated last month
- Run `strace` on program that is under another debugger☆18Updated 2 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated last week
- A zygisk module that dumps so file from process memory☆94Updated last year
- ☆29Updated 7 months ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆77Updated 3 years ago
- 关于Magisk生态的研究☆157Updated last year
- A library for hiding and retrieving imports in ELF binaries.☆187Updated 9 months ago
- 对目标函数进行trace 只适用于 arm64☆157Updated 4 months ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆197Updated last year
- ☆34Updated last year
- aosp sources without prebuilts☆16Updated 2 years ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆126Updated last year
- android jni trace for arm64 for magisk module!☆89Updated last month
- A apatch kernel module that helps you hide device environment :)☆93Updated 4 months ago
- apatch内核模块用于隐藏mountxxx & maps & smaps的指定内容☆63Updated 10 months ago