QBDI / examplesLinks
QBDI Examples
☆13Updated 3 years ago
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- Obfuscated Binaries☆32Updated 2 years ago
- monitor svc calls of android☆74Updated 7 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆33Updated last year
- DroidGuard VM Samples☆67Updated 3 years ago
- ☆33Updated 3 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆66Updated last year
- A frida module to parse Elf headers in runtime☆37Updated 6 years ago
- ☆29Updated 7 months ago
- Loadable Kernel Module for Android☆77Updated 6 years ago
- System Call Hook for ARM64☆212Updated 2 weeks ago
- A simple android utility for inject so (suport arm, aarch64)☆28Updated 2 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆24Updated 2 years ago
- zygisk插件:用于unity游戏hook☆19Updated 3 years ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- ☆26Updated 2 weeks ago
- deobfuscation BR☆53Updated last year
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated this week
- Update Frida hooks automatically.☆27Updated 2 years ago
- ☆59Updated 2 years ago
- deobfuscator llvm arm64 script☆96Updated 6 years ago
- Dynamic Process name change for Android Apps☆28Updated 5 years ago
- Run `strace` on program that is under another debugger☆18Updated 2 years ago
- A comprehensive plug-in injection toolset☆42Updated last week
- Use LD-Preload to Inject a shared library on any android version and architecture☆57Updated 2 years ago
- An approach to utilize auditd under Android 6+☆23Updated 7 years ago
- Tools for inspecting C++ code and STL objects with Frida☆32Updated 4 years ago
- Featureful library for interacting with unix processes through ptrace, supports x86_64, i686, arm, aarch64 remote function calls☆52Updated last month
- Android VM Injector☆28Updated 2 years ago
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 6 months ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆58Updated last year