Monster-GM / sandboxLinks
blackbox
☆250Updated 7 months ago
Alternatives and similar repositories for sandbox
Users that are interested in sandbox are comparing it to the libraries listed below
Sorting:
- 这是一个Android Project,具备设备指纹采集,设备安全检测的能力☆238Updated 3 months ago
- Xposed免root注入so方案, 支持android各个版本☆229Updated last year
- GirlHook is a Lua-scriptable ART hook framework designed for dynamic method interception and gadget-level instrumentation on Android. G.I…☆184Updated 4 months ago
- Overt是一款功能强大的Android设备安全检测工具☆181Updated last week
- 劫持Zygote在App启动前注入so☆335Updated last year
- Android system call hook☆228Updated 10 months ago
- LSPosed模块的两个利器:classmonitor和jnitrace☆189Updated last year
- Jnitrace for cpp☆299Updated last year
- a next-generation hooking and reflection framework built for performance, safety, and extensibility.☆246Updated 2 weeks ago
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆216Updated 6 months ago
- 一个自定义注入so的脚手架,现在已经支持了界面化使用。☆538Updated last month
- ☆91Updated 11 months ago
- ☆140Updated 2 months ago
- a few android analysis tools, jni trace by native hook, Java Object Format to Json for Xposed and Frida☆175Updated last month
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆241Updated 2 years ago
- FunJni(JNITrace & hook ,So分析神器 )☆130Updated 2 years ago
- ☆173Updated 5 months ago
- this is frida trace assemble and register change tools☆167Updated 2 years ago
- 安卓逆向相关文章中的示例代码(Sample code in Android reverse engineering articles)☆215Updated 2 months ago
- ☆170Updated last year
- ☆139Updated 10 months ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆123Updated last year
- 自定义linker加载so☆173Updated 5 months ago
- An application for detecting the runtime environment on the Android platform.☆147Updated last year
- ☆402Updated 2 years ago
- ☆381Updated 8 months ago
- 一个基于uprobe,能同时hook大量用户地址空间函数的kpm内核模块☆170Updated 4 months ago
- ☆126Updated 4 years ago
- 一个基于ptrace-seccomp简单 的重定向openat的demo☆78Updated 2 years ago
- rom逆向工具ui管理☆196Updated 3 years ago