LLeavesG / eBPFDexDumperLinks
DexDumper based eBPF on Android Platform
☆224Updated 2 weeks ago
Alternatives and similar repositories for eBPFDexDumper
Users that are interested in eBPFDexDumper are comparing it to the libraries listed below
Sorting:
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆184Updated last year
- 关于Magisk生态的研究☆153Updated last year
- A dynamic dex dumper, implemented in rust, no frida.☆143Updated 2 years ago
- ☆138Updated last month
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆119Updated last year
- Android system call hook☆218Updated 7 months ago
- ☆87Updated 9 months ago
- 一个基于uprobe,能同时hook大量用户地址空间函数的kpm内核模块☆159Updated last month
- GirlHook is a Lua-scriptable ART hook framework designed for dynamic method interception and gadget-level instrumentation on Android. G.I…☆167Updated last month
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆211Updated 4 months ago
- jadx ai analysis plug-in☆93Updated 2 weeks ago
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆200Updated 3 months ago
- frida runtime resolves smali☆85Updated 4 months ago
- Overt是一款功能强大的Android设备安全检测工具☆153Updated 2 weeks ago
- A zygisk module that dumps so file from process memory☆91Updated 11 months ago
- smali trace☆181Updated 3 years ago
- Customized Frida build for bypassing basic detections and helping ajeossideul (guys) test mobile apps with Frida☆182Updated 7 months ago
- a few android analysis tools, jni trace by native hook, Java Object Format to Json for Xposed and Frida☆160Updated last week
- 劫持Zygote在App启动前注入so☆323Updated 11 months ago
- frida dump android elf, support spawn and attach mode☆79Updated last year
- ☆123Updated 2 years ago
- 对目标函数进行trace 只适用于 arm64☆56Updated 2 weeks ago
- 用于练手的环境检测的demo☆87Updated last year
- a next-generation hooking and reflection framework built for performance, safety, and extensibility.☆211Updated this week
- Dynamic java method hook for Android,Implemented by jvmti☆54Updated 3 weeks ago
- Non-authoritatively making Frida less (not un-!)detectable by applying some symptomatic patches. Melded with CrackerCat/strongR-frida-and…☆141Updated this week
- Seccomp + Signal Intercept SVC☆88Updated 2 years ago
- 自定义linker加载so☆149Updated 3 months ago
- this is frida trace assemble and register change tools☆163Updated last year
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.☆147Updated 6 months ago