BossKoopa / BWSRLinks
Arm64 inline hooking for iOS, Android, OSX, and Linux.
☆68Updated 8 months ago
Alternatives and similar repositories for BWSR
Users that are interested in BWSR are comparing it to the libraries listed below
Sorting:
- 去除BR混淆 Deobfuscation BR☆76Updated last year
- GitHub Actions to analyse file using IDA☆30Updated 7 months ago
- Single-step debugging of native code using frida, stalker, and semaphore☆79Updated 9 months ago
- tprt ollvm 反混淆 修改 binja il☆43Updated 10 months ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆16Updated last year
- An LLVM Pass from Hikari-LLVM15☆90Updated 5 months ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆52Updated last year
- A rootkit for Android.☆54Updated last year
- deobfuscation BR☆49Updated last year
- 一个基于uprobe,能同时hook大量用户地址空间函数的kpm内核模块☆75Updated last week
- this is Android Custom Linker by Android12 LinkerSourcesCode☆42Updated last year
- ☆28Updated 3 weeks ago
- ☆58Updated 3 years ago
- monitor svc calls of android☆73Updated 6 years ago
- hwBreakpoint Test App☆19Updated 2 years ago
- vm 还原的分享☆69Updated 9 months ago
- ☆28Updated 2 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆31Updated last year
- IDA plugin which queries Local language models to speed up reverse-engineering☆23Updated last year
- 自實現Linker的小Demo☆70Updated last month
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆59Updated 7 months ago
- 使用 frida stalker 实现的 trace☆28Updated 2 years ago
- Android assembly instruction tracing tool☆38Updated 2 months ago
- Android web based memory scanner & editor.☆18Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- 还原脚本及一些测试代码☆10Updated 3 years ago
- a poc implementation arm64 tracer based on simulation☆63Updated 3 years ago
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆28Updated 3 months ago
- ☆31Updated 3 years ago
- Find JNI native methods while the app is running.☆21Updated 8 months ago