CenturionInfoSec / ebpf-examplesLinks
☆61Updated last year
Alternatives and similar repositories for ebpf-examples
Users that are interested in ebpf-examples are comparing it to the libraries listed below
Sorting:
- monitor svc calls of android☆72Updated 7 years ago
- ☆122Updated 2 years ago
- IDA plugin, unwind stack trace when debugging arm.☆139Updated 5 years ago
- ART tracing research☆92Updated 2 years ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- blabla☆49Updated 4 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆59Updated 3 years ago
- unicorn demo☆26Updated 5 years ago
- 逆向聚安全litevm相关☆53Updated 5 years ago
- ☆57Updated 3 years ago
- Obfuscated Binaries☆29Updated 2 years ago
- You can run Android Runtime in Qiling☆29Updated 3 years ago
- Small Apps As PoC to Detect Frida With Frida☆53Updated 3 years ago
- Android eBPF sample☆49Updated 3 years ago
- deobfuscator llvm arm64 script☆93Updated 6 years ago
- Instruction tracer powered by Frida☆140Updated 4 months ago
- ☆88Updated 4 years ago
- AArch64 inlineHook☆53Updated 3 years ago
- ☆20Updated 6 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆189Updated last year
- Automatically de-obfuscate ollvm and generate binaries☆114Updated 3 years ago
- An approach to utilize auditd under Android 6+☆22Updated 7 years ago
- Flutter/Dart Snapshot Reverse Tool。☆44Updated 2 years ago
- try try full features ebpf on android without Pixel 6☆20Updated 2 years ago
- Files used to resolve the r2pay challenge☆53Updated 5 years ago
- use frida monitoring android app☆48Updated 7 years ago
- IDA Python Script for anti ollvm☆106Updated 4 years ago
- break ollvm.☆109Updated 5 months ago
- 安卓绕过ptrace反调试☆70Updated 4 years ago
- A frida module to parse Elf headers in runtime☆36Updated 6 years ago