Mrack / kmem
A rootkit for Android.
☆47Updated 7 months ago
Alternatives and similar repositories for kmem:
Users that are interested in kmem are comparing it to the libraries listed below
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆42Updated 7 months ago
- ☆55Updated 2 years ago
- A zygisk module that dumps so file from process memory☆44Updated 3 months ago
- A kernel module to read and write memory in a remote process.☆50Updated 4 months ago
- this is Android Custom Linker by Android12 LinkerSourcesCode☆36Updated 9 months ago
- 去除BR混淆 Deobfuscation BR☆68Updated 6 months ago
- hwBreakpoint Test App☆16Updated 2 years ago
- 研究内核改机策略☆53Updated 10 months ago
- GitHub Actions to analyse file using IDA☆25Updated last month
- 本工具用于解决ollvm编译出来的Linux驱动文件,加载进内核会报错“please compile with -fno-common”的问题☆30Updated 3 years ago
- Inotify监听测试☆32Updated 2 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆51Updated last month
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆57Updated 2 years ago
- Capture input events of any android application☆40Updated 7 months ago
- 使用 frida stalker 实现的 trace☆24Updated 2 years ago
- tprt ollvm 反混淆 修改 binja il☆35Updated 4 months ago
- 自實現Linker的小Demo☆55Updated 6 months ago
- monitor svc calls of android☆72Updated 6 years ago
- 反ida内联汇编花指令☆49Updated last year
- Single-step debugging of native code using frida, stalker, and semaphore☆73Updated 3 months ago
- A zygisk module that hooks `libdexfile.so` to dump dex☆38Updated last month
- linux x86_64 and arm64 syscall hook☆18Updated last year
- 内核硬件调试器模块,rootkit操作 dump☆34Updated 2 years ago
- A program to read and modify the memory of other processes.☆16Updated last year
- Draw on Canvas based Overlay with RootService☆19Updated 9 months ago
- A simple android utility for inject so (suport arm, aarch64)☆24Updated last year
- obpo backend server written by golang☆32Updated last year
- deobfuscation BR☆38Updated 10 months ago