CenturionInfoSec / ebpf-examplesLinks
☆59Updated last year
Alternatives and similar repositories for ebpf-examples
Users that are interested in ebpf-examples are comparing it to the libraries listed below
Sorting:
- monitor svc calls of android☆73Updated 7 years ago
- ART tracing research☆91Updated 2 years ago
- ☆123Updated 2 years ago
- a poc implementation arm64 tracer based on simulation☆63Updated 4 years ago
- blabla☆50Updated 4 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 5 years ago
- ☆58Updated 3 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆61Updated 3 years ago
- 逆向聚安全litevm相关☆53Updated 5 years ago
- Android eBPF sample☆49Updated 3 years ago
- unicorn demo☆26Updated 4 years ago
- You can run Android Runtime in Qiling☆28Updated 3 years ago
- Obfuscated Binaries☆30Updated 2 years ago
- 安卓绕过ptrace反调试☆72Updated 4 years ago
- An approach to utilize auditd under Android 6+☆22Updated 7 years ago
- Small Apps As PoC to Detect Frida With Frida☆54Updated 3 years ago
- deobfuscation BR☆51Updated last year
- Automatically de-obfuscate ollvm and generate binaries☆113Updated 3 years ago
- try try full features ebpf on android without Pixel 6☆21Updated 2 years ago
- Instruction tracer powered by Frida☆139Updated 3 months ago
- ☆88Updated 4 years ago
- deobfuscator llvm arm64 script☆95Updated 5 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆184Updated last year
- AArch64 inlineHook☆52Updated 3 years ago
- ☆121Updated 3 years ago
- IDA Python Script for anti ollvm☆106Updated 4 years ago
- 2023 年 羊城杯 ezAndroid dex VMP 恢复工具☆37Updated last year
- A program to read and modify the memory of other processes.☆17Updated 2 years ago
- ☆35Updated 2 months ago
- A frida module to parse Elf headers in runtime☆35Updated 6 years ago