GirlHook is a Lua-scriptable ART hook framework designed for dynamic method interception and gadget-level instrumentation on Android. G.I.R.L. stands for Gadget-Injection Runtime for Lua, highlighting its modular native core and script-driven flexibility. GirlHook是一个轻量化的运行LUA脚本的Android Hook框架
☆201Jul 17, 2025Updated 7 months ago
Alternatives and similar repositories for GirlHook
Users that are interested in GirlHook are comparing it to the libraries listed below
Sorting:
- 一个基于uprobe,能同时hook大量用户地址空间函数的kpm内核模块☆187Feb 13, 2026Updated 2 weeks ago
- stalker trace cpp☆89Nov 13, 2025Updated 3 months ago
- a next-generation hooking and reflection framework built for performance, safety, and extensibility.☆273Dec 28, 2025Updated 2 months ago
- ☆93Mar 4, 2025Updated last year
- Android system call hook☆228Jan 22, 2025Updated last year
- AntiOllvm Fla with Fake Runtime☆182Jan 8, 2025Updated last year
- 劫持Zygote在App启动前注入so☆349Jan 22, 2026Updated last month
- ☆65Jul 21, 2025Updated 7 months ago
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆252Jan 23, 2026Updated last month
- android jni trace for arm64 for magisk module!☆90Nov 28, 2025Updated 3 months ago
- vm 还原的分享☆77Oct 1, 2024Updated last year
- Android assembly instruction tracing tool☆142Apr 17, 2025Updated 10 months ago
- blackbox☆270Apr 16, 2025Updated 10 months ago
- ☆387Mar 29, 2025Updated 11 months ago
- vmtrace的发布仓库,相关so 调用脚本例子都会放在里面☆539Dec 26, 2025Updated 2 months ago
- eBPF-Based DexDumper for Android☆371Dec 8, 2025Updated 2 months ago
- 对目标函数进行trace 只适用于 arm64☆167Aug 30, 2025Updated 6 months ago
- Overt是一款功能强大的Android设备安全检测工具☆216Jan 19, 2026Updated last month
- Xposed免root注入so方案, 支持android各个版本☆242May 1, 2024Updated last year
- eBPF-based lightweight debugger for Android☆757Dec 27, 2025Updated 2 months ago
- 自定义linker加载so☆203Jun 12, 2025Updated 8 months ago
- ☆379May 8, 2024Updated last year
- ☆147Sep 9, 2025Updated 5 months ago
- frida runtime resolves smali☆92Jan 24, 2026Updated last month
- ☆144Jan 10, 2025Updated last year
- a few android analysis tools, jni trace by native hook, Java Object Format to Json for Xposed and Frida☆187Oct 20, 2025Updated 4 months ago
- 一个自定义注入so的脚手架,现在已经支持了界面化使用。☆612Dec 26, 2025Updated 2 months ago
- 研究内核改机策略☆69Mar 13, 2024Updated last year
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.☆159Feb 4, 2026Updated last month
- ☆175Jun 27, 2025Updated 8 months ago
- 用于练手的环境检测的demo☆92Jan 3, 2024Updated 2 years ago
- ☆105Dec 5, 2024Updated last year
- Android arm arm64-v8a ShellCode Generate☆30Jul 13, 2025Updated 7 months ago
- A library for hiding and retrieving imports in ELF binaries.☆192Apr 18, 2025Updated 10 months ago
- ☆417Mar 17, 2023Updated 2 years ago
- Use frida-gum's stalker for tracing☆81Jan 10, 2026Updated last month
- 对frida 16.2.1的patch☆320Feb 6, 2026Updated 3 weeks ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆127Jan 26, 2024Updated 2 years ago
- 自實現Linker的小Demo☆76Jun 5, 2025Updated 9 months ago