QBDI / examplesLinks
QBDI Examples
☆13Updated 2 years ago
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- Update Frida hooks automatically.☆27Updated last year
- zygisk插件:用于unity游戏hook☆18Updated 2 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆31Updated 10 months ago
- A frida module to parse Elf headers in runtime☆35Updated 5 years ago
- Obfuscated Binaries☆29Updated 2 years ago
- A simple android utility for inject so (suport arm, aarch64)☆28Updated last year
- ☆31Updated 3 years ago
- Find JNI native methods while the app is running.☆21Updated 7 months ago
- Getting better stacks and backtraces in Frida☆38Updated 11 months ago
- obpo backend server written by golang☆32Updated last year
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆28Updated 5 months ago
- deobfuscation BR☆46Updated last year
- DroidGuard VM Samples☆51Updated 3 years ago
- ☆50Updated last year
- Dynamic Process name change for Android Apps☆28Updated 4 years ago
- ARM64 Assembly Code and Memory Simulator☆32Updated last year
- Frida module utils, writen in typescript☆16Updated last year
- ☆27Updated 4 months ago
- This project tries to integrate imgui to an Android Cocos2d-x game using Frida☆12Updated 2 years ago
- Frida's setHardwareWatchpoint tutorial☆48Updated 7 months ago
- Root takeover via signature spoofing in KernelSU☆17Updated last year
- This is a NodeJS project for Frida to draw ESP Line and Box on a game using Canvas.☆37Updated last year
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆16Updated last year
- Android Overlay Hijack☆23Updated 8 months ago
- A c++ (jni) implementation of KeyAttestation for Android☆22Updated last year
- ☆17Updated 11 months ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆53Updated this week
- An approach to utilize auditd under Android 6+☆22Updated 6 years ago
- Run `strace` on program that is under another debugger☆17Updated last year