QBDI / examplesLinks
QBDI Examples
☆13Updated 3 years ago
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- Obfuscated Binaries☆32Updated 2 years ago
- A simple android utility for inject so (suport arm, aarch64)☆28Updated 2 years ago
- ☆59Updated 2 years ago
- ☆29Updated 6 months ago
- ☆33Updated 3 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆33Updated last year
- monitor svc calls of android☆74Updated 7 years ago
- Update Frida hooks automatically.☆27Updated 2 years ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- zygisk插件:用于unity游戏hook☆19Updated 3 years ago
- Use LD-Preload to Inject a shared library on any android version and architecture☆57Updated 2 years ago
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 5 months ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆66Updated last year
- This is a NodeJS project for Frida to draw ESP Line and Box on a game using Canvas.☆37Updated 2 years ago
- DroidGuard VM Samples☆67Updated 3 years ago
- An approach to utilize auditd under Android 6+☆22Updated 7 years ago
- A frida module to parse Elf headers in runtime☆37Updated 6 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆24Updated 2 years ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆17Updated last year
- Android AntiCheat☆48Updated 3 years ago
- deobfuscator llvm arm64 script☆96Updated 6 years ago
- Android Anti Root Detection☆23Updated 3 years ago
- Find JNI native methods while the app is running.☆21Updated last year
- inject luajit bytecode☆18Updated 3 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆86Updated last year
- deobfuscation BR☆53Updated last year
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated this week
- Dump Memory Segment From Process Memory and Rebuild ELF So Binaries☆30Updated 4 years ago
- Simulator/interpreter for Arm64 machine language☆14Updated 3 years ago
- System Call Hook for ARM64☆204Updated 3 weeks ago