BossKoopa / BWSRLinks
Arm64 inline hooking for iOS, Android, OSX, and Linux.
☆70Updated last year
Alternatives and similar repositories for BWSR
Users that are interested in BWSR are comparing it to the libraries listed below
Sorting:
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 3 months ago
- 去除BR混淆 Deobfuscation BR☆80Updated last year
- Android assembly instruction tracing tool☆121Updated 6 months ago
- GitHub Actions to analyse file using IDA☆30Updated 11 months ago
- Single-step debugging of native code using frida, stalker, and semaphore☆82Updated last year
- tprt ollvm 反混淆 修改 binja il☆47Updated last year
- PoC showing a method to hide syscalls on XNU (arm64 macOS and iOS) from static analysis☆27Updated 3 years ago
- vm 还原的分享☆72Updated last year
- deobfuscation BR☆52Updated last year
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆15Updated last year
- 使用 frida stalker 实现的 trace☆29Updated 2 years ago
- Traces syscalls on iOS via Frida, including Mach syscalls.☆80Updated last week
- It can help you better use Frida in SO binaries☆34Updated 2 years ago
- deobf tx libtprt's obfuscation☆49Updated last year
- ☆32Updated 2 years ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆53Updated last year
- An LLVM Pass from Hikari-LLVM15☆115Updated 8 months ago
- Android aarch64 kernel rootkit(driver module)☆101Updated last week
- monitor svc calls of android☆72Updated 7 years ago
- ☆59Updated 3 years ago
- 自實現Linker的小Demo☆70Updated 4 months ago
- A rootkit for Android.☆54Updated last year
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆33Updated 7 months ago
- ☆27Updated 4 months ago
- Inotify监听测试☆34Updated 3 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆64Updated 11 months ago
- 还原脚本及一些测试代码☆10Updated 4 years ago
- this is Android Custom Linker by Android12 LinkerSourcesCode☆45Updated last year
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆23Updated last year