CenturionInfoSec / ebpf-examplesLinks
☆61Updated last year
Alternatives and similar repositories for ebpf-examples
Users that are interested in ebpf-examples are comparing it to the libraries listed below
Sorting:
- monitor svc calls of android☆72Updated 7 years ago
- ☆122Updated 3 years ago
- ART tracing research☆91Updated 2 years ago
- blabla☆49Updated 5 years ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- ☆58Updated 4 years ago
- Obfuscated Binaries☆31Updated 2 years ago
- Small Apps As PoC to Detect Frida With Frida☆55Updated 3 years ago
- IDA plugin, unwind stack trace when debugging arm.☆139Updated 5 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆59Updated 3 years ago
- 安卓绕过ptrace反调试☆71Updated 4 years ago
- Android eBPF sample☆50Updated 3 years ago
- You can run Android Runtime in Qiling☆29Updated 3 years ago
- unicorn demo☆26Updated 5 years ago
- 逆向聚安全litevm相关☆53Updated 5 years ago
- ☆23Updated 6 years ago
- AArch64 inlineHook☆55Updated 3 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆195Updated last year
- ☆89Updated 4 years ago
- deobfuscation BR☆52Updated last year
- Automatically de-obfuscate ollvm and generate binaries☆114Updated 3 years ago
- An approach to utilize auditd under Android 6+☆22Updated 7 years ago
- deobfuscator llvm arm64 script☆93Updated 6 years ago
- ☆121Updated 3 years ago
- try try full features ebpf on android without Pixel 6☆20Updated 3 years ago
- IDA Python Script for anti ollvm☆107Updated 4 years ago
- Android Root Zap Framework, Lazy and Powerful :)☆54Updated 4 months ago
- Instruction tracer powered by Frida☆153Updated 5 months ago
- Files used to resolve the r2pay challenge☆54Updated 5 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆23Updated last year