QBDI / examplesLinks
QBDI Examples
☆13Updated 3 years ago
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆33Updated last year
- ☆26Updated 2 weeks ago
- monitor svc calls of android☆74Updated 7 years ago
- DroidGuard VM Samples☆67Updated 3 years ago
- A simple android utility for inject so (suport arm, aarch64)☆28Updated 2 years ago
- ☆33Updated 3 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆66Updated last year
- deobfuscation BR☆53Updated last year
- ARM64 Assembly Code and Memory Simulator☆35Updated last year
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 6 months ago
- Obfuscated Binaries☆32Updated 2 years ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- Taint Analysis Engine and Trace Exploration : Overcome Obfuscation☆52Updated 3 months ago
- ☆59Updated 2 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated this week
- System Call Hook for ARM64☆212Updated 2 weeks ago
- tprt ollvm 反混淆 修改 binja il☆50Updated last year
- Update Frida hooks automatically.☆27Updated 2 years ago
- Use LD-Preload to Inject a shared library on any android version and architecture☆57Updated 2 years ago
- Android Anti Root Detection☆23Updated 3 years ago
- Android assembly instruction tracing tool☆141Updated 9 months ago
- GitHub Actions to analyse file using IDA☆35Updated last year
- Single-step debugging of native code using frida, stalker, and semaphore☆86Updated last year
- ☆29Updated 7 months ago
- Find JNI native methods while the app is running.☆21Updated last year
- PoC for CVE-2024-23700, Android slient privilege escalation allow to read/write contacts, SMS, calendar, call log and voicemail, make out…☆54Updated last week
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆24Updated 2 years ago
- Loadable Kernel Module for Android☆77Updated 6 years ago
- Frida's setHardwareWatchpoint tutorial☆63Updated last year
- 基于 Unicorn 引擎的轻量级 ARM64 动态追踪模拟工具。支持 IDA Pro、生成 Tenet 日志、本地代码模拟、内存转储、寄存器状态追踪和指令级日志记录。☆171Updated this week