CenturionInfoSec / ebpf-examples
☆58Updated 9 months ago
Alternatives and similar repositories for ebpf-examples:
Users that are interested in ebpf-examples are comparing it to the libraries listed below
- monitor svc calls of android☆73Updated 6 years ago
- ☆116Updated 2 years ago
- blabla☆49Updated 4 years ago
- a poc implementation arm64 tracer based on simulation☆54Updated 3 years ago
- 逆向聚安全litevm相关☆53Updated 4 years ago
- AArch64 inlineHook☆51Updated 2 years ago
- An approach to utilize auditd under Android 6+☆21Updated 6 years ago
- Small Apps As PoC to Detect Frida With Frida☆51Updated 3 years ago
- You can run Android Runtime in Qiling☆26Updated 2 years ago
- ☆56Updated 3 years ago
- ☆117Updated 3 years ago
- ☆40Updated 2 weeks ago
- Android eBPF sample☆47Updated 2 years ago
- ART tracing research☆90Updated 2 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆165Updated 10 months ago
- unicorn demo☆26Updated 4 years ago
- 安卓绕过ptrace反调试☆70Updated 4 years ago
- ☆20Updated 5 years ago
- 一个基于ptrace-seccomp简单的重定向openat的demo☆70Updated 2 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago
- Obfuscated Binaries☆29Updated 2 years ago
- DexDumper based eBPF on Android Platform☆117Updated 3 months ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆61Updated 2 years ago
- ☆21Updated 5 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- 检测got hook(使用xhook测试)☆26Updated 3 years ago
- 移植Youpk到Pixel2XL上☆89Updated 2 years ago
- try try full features ebpf on android without Pixel 6☆21Updated 2 years ago
- smali trace☆164Updated 2 years ago
- Reverse Engineering about 360 android app guard☆58Updated 5 years ago