MatrixEditor / pairipcore-vm
Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompiling the bytecode.
☆99Updated 2 months ago
Alternatives and similar repositories for pairipcore-vm:
Users that are interested in pairipcore-vm are comparing it to the libraries listed below
- A zygisk module that dumps so file from process memory☆62Updated 5 months ago
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆85Updated 2 years ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆63Updated 2 years ago
- 去除BR混淆 Deobfuscation BR☆73Updated 9 months ago
- frida runtime resolves smali☆80Updated 4 months ago
- AntiOllvm Fla with Fake Runtime☆153Updated 2 months ago
- Stealth patch for Frida, stealth knowledge collection☆69Updated 7 months ago
- Remap a library to avoid detection☆103Updated last year
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆65Updated 2 years ago
- Customized Frida build for bypassing basic detections and helping ajeossideul (guys) test mobile apps with Frida☆78Updated last month
- Inject shared libraries into processes on Android (real/emulator device supported)☆96Updated 10 months ago
- ☆50Updated last year
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆48Updated 10 months ago
- Single-step debugging of native code using frida, stalker, and semaphore☆75Updated 5 months ago
- A Reversal and bypass for Appsealing☆63Updated 6 months ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆162Updated 9 months ago
- A library for hiding and retrieving imports in ELF binaries.☆155Updated 2 months ago
- Simple frida anti-detection patch☆35Updated last month
- This is a NodeJS project for Frida to draw ESP Line and Box on a game using Canvas.☆36Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- Android system call hook☆192Updated 2 months ago
- DexDumper based eBPF on Android Platform☆109Updated 2 months ago
- monitor svc calls of android☆73Updated 6 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆58Updated 4 months ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆101Updated last year
- ☆49Updated last month
- frida dump android elf, support spawn and attach mode☆74Updated last year
- Use LD-Preload to Inject a shared library on any android version and architecture☆53Updated last year
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆53Updated this week
- Public researchings of the Google's Android apps protection☆203Updated 4 months ago