QBDI / examplesLinks
QBDI Examples
☆13Updated 3 years ago
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆32Updated last year
- ☆32Updated 3 years ago
- A simple android utility for inject so (suport arm, aarch64)☆27Updated 2 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆23Updated last year
- ☆58Updated 2 years ago
- Obfuscated Binaries☆30Updated 2 years ago
- ☆28Updated 5 months ago
- monitor svc calls of android☆72Updated 7 years ago
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 3 months ago
- zygisk插件:用于unity游戏hook☆19Updated 2 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆64Updated 11 months ago
- Run `strace` on program that is under another debugger☆18Updated 2 years ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆56Updated 3 weeks ago
- deobfuscation BR☆52Updated last year
- This is a NodeJS project for Frida to draw ESP Line and Box on a game using Canvas.☆37Updated 2 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆82Updated last year
- DroidGuard VM Samples☆64Updated 3 years ago
- Update Frida hooks automatically.☆27Updated 2 years ago
- A frida module to parse Elf headers in runtime☆36Updated 6 years ago
- Find JNI native methods while the app is running.☆20Updated last year
- a simple tool for easyily dev/debug using frida and write module for agent. (mainly used for android)☆82Updated 4 months ago
- An approach to utilize auditd under Android 6+☆22Updated 7 years ago
- A small script to get syscall info from its number (intented to be used with Frida)☆20Updated 4 years ago
- Dump Memory Segment From Process Memory and Rebuild ELF So Binaries☆29Updated 4 years ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆15Updated last year
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆162Updated 9 months ago
- Taint Analysis Engine and Trace Exploration : Overcome Obfuscation☆47Updated last month
- Android Anti Root Detection☆22Updated 3 years ago
- Android assembly instruction tracing tool☆125Updated 7 months ago