☆61Jul 12, 2024Updated last year
Alternatives and similar repositories for ebpf-examples
Users that are interested in ebpf-examples are comparing it to the libraries listed below
Sorting:
- choose demo☆20Nov 6, 2025Updated 3 months ago
- ☆122Nov 24, 2022Updated 3 years ago
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆648May 14, 2024Updated last year
- arm汇编学习_linker学习笔记_Android逆向学习笔记☆143Nov 28, 2025Updated 3 months ago
- ☆21Apr 4, 2020Updated 5 years ago
- An approach to utilize auditd under Android 6+☆23Aug 24, 2018Updated 7 years ago
- android memory access trace utility powered by frida framework☆246Apr 2, 2022Updated 3 years ago
- ☆417Mar 17, 2023Updated 2 years ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆478Jun 1, 2020Updated 5 years ago
- Dump Memory of Process in Android☆323Mar 30, 2021Updated 4 years ago
- try try full features ebpf on android without Pixel 6☆22Nov 1, 2022Updated 3 years ago
- codeless Android hook (experimental)☆69Jul 27, 2022Updated 3 years ago
- Small Apps As PoC to Detect Frida With Frida☆55Mar 16, 2022Updated 3 years ago
- Trace jni calls with eBPF on Android☆24Jun 21, 2022Updated 3 years ago
- 一个基于ptrace-seccomp简单的重定向openat的demo☆81Dec 14, 2022Updated 3 years ago
- This is a library that can bypass the hidden api restriction on Android 9-12.☆134Jul 12, 2025Updated 7 months ago
- 一个简易的unicorn tracer,剪裁自项目Rainbow。☆28Apr 8, 2021Updated 4 years ago
- From: https://gitlab.com/simonpunk/susfs4ksu/☆23Feb 3, 2026Updated 3 weeks ago
- eBPF Android Debug Bridge☆547Mar 30, 2024Updated last year
- Is a protect Android App anti any attacks and environments.☆356Dec 28, 2023Updated 2 years ago
- An OLLVM-CFF Deobfuscation Plugin☆627Dec 5, 2023Updated 2 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,818Jul 18, 2023Updated 2 years ago
- Kotoamatsukami is an obfuscator based on LLVM-17, utilizing LLVM's new pass to implement plug-in features, for obfuscating multiple langu…☆61Mar 26, 2025Updated 11 months ago
- smali trace☆207May 22, 2022Updated 3 years ago
- Anti-Debug and Anti-Memory Dump for Android☆282Feb 21, 2021Updated 5 years ago
- A couple of methods for detecting Frida on Android.☆493Mar 17, 2022Updated 3 years ago
- Load dex on ART in interpret mode☆19Dec 14, 2018Updated 7 years ago
- Script to quickly hook natives call to JNI in Android☆625Aug 3, 2023Updated 2 years ago
- ☆89Jun 10, 2021Updated 4 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆60Aug 11, 2022Updated 3 years ago
- Deobfuscate OLLVM Bogus Control Flow via angr☆68Nov 26, 2021Updated 4 years ago
- 自己收集与编写的常用IDA脚本,通常用于反混淆☆91Feb 28, 2025Updated last year
- Android eBPF sample☆52Jun 19, 2022Updated 3 years ago
- make it possible to run method of android-app with original Java Virtual Machine.☆256Feb 8, 2025Updated last year
- An improved version of AndroidNativeEmu,Allow running android elf on PC☆700Dec 1, 2023Updated 2 years ago
- 研究内核改机策略☆69Mar 13, 2024Updated last year
- 一个superuser的原理性的实现☆41Sep 14, 2024Updated last year
- Android Ptrace Injector☆260Jan 2, 2024Updated 2 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago