NepMods / InjectARM64Links
Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access. By utilizing a virtual space. Supports Android 8-14
☆66Updated last year
Alternatives and similar repositories for InjectARM64
Users that are interested in InjectARM64 are comparing it to the libraries listed below
Sorting:
- Use LD-Preload to Inject a shared library on any android version and architecture☆57Updated 2 years ago
- Android AntiCheat☆48Updated 3 years ago
- Dump Memory Segment From Process Memory and Rebuild ELF So Binaries☆31Updated 4 years ago
- ☆60Updated 3 years ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆58Updated last year
- Capture input events of any android application☆48Updated last year
- Remap a library to avoid detection☆131Updated 2 years ago
- Android aarch64 kernel driver module providing efficient memory operations, touch simulation and IPC. Features include fast memory remapp…☆97Updated 5 months ago
- Draw on Canvas based Overlay with RootService☆19Updated last year
- A rootkit for Android.☆62Updated last year
- Android assembly instruction tracing tool☆141Updated 9 months ago
- A kernel module to read and write memory in a remote process.☆73Updated last year
- GitHub Actions to analyse file using IDA☆35Updated last year
- 自實現Linker的小Demo☆76Updated 8 months ago
- with this repo you can bypass libpairipcore tamper and signature protection☆51Updated 9 months ago
- Inotify监听测试☆35Updated 3 years ago
- A zygisk module that dumps so file from process memory☆94Updated last year
- this is Android Custom Linker by Android12 LinkerSourcesCode☆45Updated last year
- ☆19Updated 4 months ago
- Android aarch64 kernel rootkit(driver module)☆131Updated last month
- Il2CppDumper for Call of Duty☆34Updated last year
- Dedicated library for runtime code patching, injection and some useful memory utilities. works for both Android and Linux☆142Updated 4 months ago
- A simple android utility for inject so (suport arm, aarch64)☆28Updated 2 years ago
- ☆18Updated 2 years ago
- il2cpp游戏的string类实现char*与std::string的转换和修改☆52Updated 5 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆86Updated last year
- ☆34Updated last year
- Android Anti Root Detection☆23Updated 3 years ago
- 去除BR混淆 Deobfuscation BR☆91Updated last year
- ☆29Updated 2 years ago