DeNA / mempatchLinks
Memory tampering tool for security assessment
☆22Updated 7 months ago
Alternatives and similar repositories for mempatch
Users that are interested in mempatch are comparing it to the libraries listed below
Sorting:
- Frida module to continue stalking on pthread_create☆20Updated 5 years ago
- ELF obfuscator written in Rust☆23Updated 2 weeks ago
- Frida's setHardwareWatchpoint tutorial☆50Updated 8 months ago
- App for learnfrida.info☆21Updated 2 years ago
- iPhoneを遠隔操作するやつ☆16Updated 2 years ago
- Mobile app memory view & edit PyQt6 program☆64Updated last month
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆68Updated 8 months ago
- ☆23Updated 2 years ago
- ☆51Updated last month
- iOS kernel memory explorer☆14Updated last year
- Android web based memory scanner & editor.☆18Updated last year
- Search running processes on iOS for instances of a given objc class.☆50Updated 5 months ago
- A tracer based on frida for XPC messages in iOS and macOS.☆33Updated 2 years ago
- PoC showing a method to hide syscalls on XNU (arm64 macOS and iOS) from static analysis☆29Updated 2 years ago
- Find JNI native methods while the app is running.☆21Updated 8 months ago
- Getting better stacks and backtraces in Frida☆48Updated 2 weeks ago
- Traces syscalls on iOS via Frida, including Mach syscalls☆76Updated last year
- Naville's HikariObfuscator for LLVM 12. Under active development. Use with caution.☆56Updated 2 years ago
- My ongoing premier on reversing Swift☆85Updated 5 months ago
- ☆51Updated last year
- alternative strace for iOS device(64bit) on frida☆151Updated 3 years ago
- iOS Easy Hooking Library☆26Updated 3 years ago
- ☆31Updated 3 years ago
- ☆23Updated 2 weeks ago
- What is Frida,Why is Frida, How about Frida☆42Updated 6 months ago
- ☆53Updated 4 months ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆16Updated last year
- ☆28Updated last week
- System Call Hook for ARM64☆157Updated last week
- 利用frida打印IOS中OC函数中各类型参数,初步总结☆12Updated 2 years ago