NiTianErXing666 / -AndroidReverseLinks
安卓逆向学习
☆26Updated this week
Alternatives and similar repositories for -AndroidReverse
Users that are interested in -AndroidReverse are comparing it to the libraries listed below
Sorting:
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆119Updated last year
- apatch内核模块 用于文件重定向☆61Updated 5 months ago
- Xposed免root注入so方案, 支持android各个版本☆218Updated last year
- 一个用于在安卓平台上进行主动调用来dump unity手游的so模块。☆62Updated 3 months ago
- GirlHook is a Lua-scriptable ART hook framework designed for dynamic method interception and gadget-level instrumentation on Android. G.I…☆161Updated last month
- android jni trace for arm64 for magisk module!☆73Updated 2 months ago
- ☆131Updated last month
- 用于 练手的环境检测的demo☆84Updated last year
- 一个基于ptrace-seccomp简单的重定向openat的demo☆76Updated 2 years ago
- 允许您全局修改传感器的值,无需注入特定app以防被检测☆38Updated 3 months ago
- ☆86Updated 8 months ago
- ☆85Updated 4 months ago
- ☆48Updated 2 years ago
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆197Updated 3 months ago
- Seccomp + Signal Intercept SVC☆89Updated 2 years ago
- Use frida-gum's stalker for tracing☆35Updated 2 months ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆72Updated 2 years ago
- blackbox☆221Updated 4 months ago
- ☆47Updated 2 years ago
- Overt是一款功能强大的Android设备安全检测工具☆139Updated 3 weeks ago
- ☆74Updated 5 months ago
- ☆23Updated last year
- frida runtime resolves smali☆85Updated 3 months ago
- Android system call hook☆216Updated 7 months ago
- 自定义linker加载so☆142Updated 2 months ago
- ☆54Updated 4 months ago
- 使用 Frida Stalker 反 OLLVM 算法还原(函数调用分析、参数分析、打印调用堆栈、指令&寄存器Trace)。 Using Frida Stalker to Bypass OLLVM and Restore (Function Call Analysis, …☆40Updated 2 months ago
- ☆138Updated 7 months ago
- 关于Magisk生态的研究☆151Updated last year
- stalker trace cpp☆66Updated 5 months ago