使用 Frida Stalker 反 OLLVM 算法还原(函数调用分析、参数分析、打印调用堆栈、指令&寄存器Trace)。 Using Frida Stalker to Bypass OLLVM and Restore (Function Call Analysis, Parameter Analysis, Stack Trace Printing, Instruction & Registers Trace).
☆78Sep 18, 2025Updated 5 months ago
Alternatives and similar repositories for frida_stalker
Users that are interested in frida_stalker are comparing it to the libraries listed below
Sorting:
- Cross-platform instrumentation and introspection library written in C☆62Nov 10, 2025Updated 3 months ago
- ☆93Mar 4, 2025Updated last year
- Frida implements GOT hook☆48May 28, 2025Updated 9 months ago
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆252Jan 23, 2026Updated last month
- 对目标函数进行trace 只适用于 arm64☆167Aug 30, 2025Updated 6 months ago
- A zygisk module that dumps so file from process memory☆96Oct 9, 2024Updated last year
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆281May 16, 2025Updated 9 months ago
- frida脚本集合☆31Feb 6, 2026Updated last month
- GitHub Actions to analyse file using IDA☆35Nov 21, 2024Updated last year
- UnidbgTraceViewer☆30Jan 20, 2026Updated last month
- Java + Native 全自动 SSL Pinning 绕过脚本(Universal SSL Pinning Bypass Script (Java & Native Combined))☆46Jul 1, 2025Updated 8 months ago
- KeyFinder 是一个Unidbg插件,通过内存检索的方式查找AES的密钥,增强Unidbg分析和还原算法的能力。☆198Oct 18, 2021Updated 4 years ago
- LSPosed模块的两个利器:classmonitor和jnitrace☆189Jul 21, 2024Updated last year
- 一个用于对unity il2cpp框架开发的安卓端手游进行trace的so模块☆59Jan 24, 2026Updated last month
- ☆418Mar 17, 2023Updated 2 years ago
- ☆19Feb 10, 2026Updated 3 weeks ago
- 一个用于隐藏apatch root挂载文件特征的内核模块☆99Feb 26, 2025Updated last year
- ☆21Sep 13, 2022Updated 3 years ago
- 一些技术笔记☆46Jul 1, 2024Updated last year
- 一个IDA脚本,可以检测出哈希算法(无论是否魔改常数)并生成frida hook 代码。☆441Jul 14, 2021Updated 4 years ago
- A comprehensive plug-in injection toolset☆42Jan 29, 2026Updated last month
- a few android analysis tools, jni trace by native hook, Java Object Format to Json for Xposed and Frida☆187Oct 20, 2025Updated 4 months ago
- qtrace release repository :)☆41Jan 6, 2026Updated 2 months ago
- frida runtime resolves smali☆92Jan 24, 2026Updated last month
- stalker trace cpp☆89Nov 13, 2025Updated 3 months ago
- ☆147Sep 9, 2025Updated 5 months ago
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆39Mar 13, 2025Updated 11 months ago
- apatch内核模块 用于文件重定向☆75Mar 19, 2025Updated 11 months ago
- ☆129Aug 16, 2021Updated 4 years ago
- vmtrace的发布仓库,相关so 调用脚本例子都会放在里面☆539Dec 26, 2025Updated 2 months ago
- eBPF-Based DexDumper for Android☆371Dec 8, 2025Updated 2 months ago
- The actual injected payload of Fripack.☆26Feb 25, 2026Updated last week
- IDA command palette & more (Ctrl+Shift+P, Ctrl+P)☆24Feb 16, 2026Updated 2 weeks ago
- 检测got hook(使用xhook测试)☆29Sep 14, 2021Updated 4 years ago
- 常用的加密算法理解以及魔改、对抗思路☆60May 28, 2023Updated 2 years ago
- A script to make AndroidManifest.xml can not be decompiled by jadx or apktool but can run on Android system.☆15Dec 5, 2022Updated 3 years ago
- Flutter Mobile Application Reverse Engineering Tool☆13Feb 1, 2026Updated last month
- 逆向之路☆13Mar 18, 2019Updated 6 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆87Oct 9, 2024Updated last year