IdanBanani / ELF-Processs-Injection-Linux-AndroidLinks
Shared object ELF Process injection and loading resources.
☆9Updated 8 months ago
Alternatives and similar repositories for ELF-Processs-Injection-Linux-Android
Users that are interested in ELF-Processs-Injection-Linux-Android are comparing it to the libraries listed below
Sorting:
- Implementation of sllvm obfuscator☆66Updated 2 years ago
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆38Updated last year
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆74Updated last year
- Injecting into SELinux-protected system service processes under root on Android.☆40Updated last year
- In-memory ELF shared library loading☆40Updated 2 years ago
- ☆36Updated 2 years ago
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆34Updated last month
- 使用 Intel 虚拟化特性实现应用层HOOK☆61Updated 3 months ago
- llvm powered deobfuscation of a vm-based protection☆36Updated last month
- XrefsExt plugin for IDA Pro(idapython,ida plugin,ida plugins)☆24Updated 6 months ago
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆65Updated last year
- deflat plugins for ida pro☆37Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆65Updated last year
- Emulate Drivers in RING3 with self context mapping or unicorn☆17Updated 5 months ago
- ☆22Updated last year
- 跨平台模拟执行unicorn框架基于Qemu的TCG模式(Tiny Code Generator),以无硬件虚拟化支持方式实现全系统的虚拟化,支持跨平台和架构的CPU指令模拟,本文讨论是一款笔者的实验性项目采用Windows Hypervisor Platform虚拟机模式…☆67Updated last year
- ☆24Updated 8 months ago
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆104Updated 4 years ago
- VMProtectTest☆36Updated 2 years ago
- system call hooking on arm64 linux via a variety of methods☆50Updated 3 years ago
- A collection of LLVM passes for obfuscating☆35Updated 2 years ago
- LLDB based debugger for Linux Kernel☆25Updated 2 months ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆131Updated last year
- a code virtualizer based on angr☆29Updated 2 years ago
- ☆18Updated 7 months ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Updated last year
- Getting better stacks and backtraces in Frida☆38Updated 11 months ago
- An x86-64 code virtualizer for VM based obfuscation☆120Updated 5 months ago
- 一个仅使用2字节修改实现内核任意函数hook的方法。☆50Updated 2 weeks ago
- LLVM Obfuscation Pass☆20Updated 6 months ago