FrenchYeti / frida-syscall
A small script to get syscall info from its number (intented to be used with Frida)
☆21Updated 3 years ago
Alternatives and similar repositories for frida-syscall:
Users that are interested in frida-syscall are comparing it to the libraries listed below
- ☆29Updated 2 years ago
- Obfuscated Binaries☆28Updated last year
- 使用 frida stalker 实现的 trace☆24Updated 2 years ago
- 一个简易的unicorn tracer,剪裁自项目Rainbow。☆24Updated 3 years ago
- try try full features ebpf on android without Pixel 6☆21Updated 2 years ago
- Small Apps As PoC to Detect Frida With Frida☆51Updated 2 years ago
- Dump process memory with FRIDA.☆14Updated 10 months ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆19Updated last year
- An approach to utilize auditd under Android 6+☆21Updated 6 years ago
- Android-Syscall-Logger☆21Updated 3 years ago
- obpo backend server written by golang☆32Updated last year
- ☆15Updated 3 years ago
- deobfuscation BR☆38Updated 10 months ago
- monitor svc calls of android☆72Updated 6 years ago
- A frida module to parse Elf headers in runtime☆31Updated 5 years ago
- ☆21Updated 4 years ago
- ida 对抗 花指令, 基于 ida 7.5 sdk 编写☆17Updated 11 months ago
- ☆54Updated 3 years ago
- A small utilities to scan process memory and search patterns using frida with a single line of command☆21Updated 3 years ago
- AArch64 inlineHook☆48Updated 2 years ago
- IDA Python Script for anti ollvm-arm☆27Updated 3 years ago
- IDA plugin which queries Local language models to speed up reverse-engineering☆19Updated 8 months ago
- Android Overlay Hijack☆21Updated 4 months ago
- 检测got hook(使用xhook测试)☆24Updated 3 years ago
- ☆25Updated this week
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆58Updated 2 years ago
- ☆10Updated 2 years ago
- GitHub Actions to analyse file using IDA☆25Updated last month