PShocker / Zygisk-ModuleTemplateLinks
Zygisk module template.
☆24Updated last year
Alternatives and similar repositories for Zygisk-ModuleTemplate
Users that are interested in Zygisk-ModuleTemplate are comparing it to the libraries listed below
Sorting:
- Remap a library to avoid detection☆126Updated last year
- Capture input events of any android application☆48Updated last year
- ☆84Updated 3 months ago
- 一个用于在安卓平台上进行主动调用来dump unity手游的so模块。☆58Updated 2 months ago
- Inotify监听测试☆34Updated 3 years ago
- Draw on Canvas based Overlay with RootService☆20Updated last year
- apatch内核模块 用于文件重定向☆60Updated 4 months ago
- Android aarch64 kernel driver module providing efficient memory operations, touch simulation and IPC. Features include fast memory remapp…☆58Updated 5 months ago
- ☆18Updated 3 years ago
- android8 arm64 注入方案☆36Updated 4 years ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆52Updated last year
- Dump Memory Segment From Process Memory and Rebuild ELF So Binaries☆31Updated 4 years ago
- 一个基于ptrace-seccomp简单的重定向openat的demo☆76Updated 2 years ago
- A library for hiding and retrieving imports in ELF binaries.☆180Updated 3 months ago
- ☆81Updated last year
- A rootkit for Android.☆54Updated last year
- Android NDK Toolchains with llvm based obfuscator☆16Updated 4 years ago
- 修改app包名,实现随机包名,☆50Updated 3 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆62Updated 8 months ago
- 用于练手的环境检测的demo☆81Updated last year
- FunIl2cpp(il2cpp游戏dump&il2cpp方法调用跟踪)☆58Updated 2 years ago
- 个人专用 ONEPLUS 5 内核,做了一些基础的反调试修改(从 maps 隐藏特定 lib,最完整最正常的 tracerPid 修改措施)☆81Updated 3 years ago
- ☆15Updated 8 months ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆119Updated last year
- apatch kpm 模块通用内核读写内存 linux kernel read only support ARM64(based apatch)☆40Updated 2 months ago
- A zygisk module that hooks `libdexfile.so` to dump dex☆79Updated 8 months ago
- A Kernel module to break the kernel read-only to modify the syscall_table purpose (only in the Linux Arm64 6.6 Kernel test runs properly)…☆28Updated 6 months ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆72Updated 2 years ago
- 本工具用于在无Linux内核源码的情况下,查找出内核函数load_module的位置,确保在无内核源码的情况下,顺利去除所有加载驱动的验证,此工具适用于所有Linux ARM64内核☆123Updated last week
- apatch内核模块用于隐藏mountxxx & maps & smaps的指定内容☆54Updated 5 months ago