Rprop / ndk_traceLinks
Start method tracing using Android's internal APIs
☆13Updated 7 years ago
Alternatives and similar repositories for ndk_trace
Users that are interested in ndk_trace are comparing it to the libraries listed below
Sorting:
- IDA plugin aid to set android so breakpoint☆32Updated 7 years ago
- unpack UPX on android.☆35Updated 6 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆19Updated 5 years ago
- rewrite dex file☆41Updated 3 years ago
- Android Injector☆23Updated 8 years ago
- android hide root demo, code from Magisk☆20Updated 6 years ago
- ☆41Updated 8 years ago
- 娜迦DEX文件修复程序☆25Updated 7 years ago
- 修改Opcode有关,写入map文件时函数末尾数据暂时有问题☆15Updated 7 years ago
- read process memory with process_vm_readv☆16Updated 5 years ago
- A frida module to parse Elf headers in runtime☆35Updated 5 years ago
- An Xposed plugin loader without rebooting the phone☆3Updated 3 years ago
- JNI Helper Plugin☆53Updated 5 months ago
- simple dex string deobfuscator☆13Updated 5 years ago
- ARM Emulator Developing(interp + jit + aot)☆28Updated 4 years ago
- substrate framework for android based on frida☆16Updated 5 years ago
- 修改版substrate Hook,使用源码编译成静态库☆14Updated 6 years ago
- modify field(modWhen, crc) in android odex file;安卓APP“寄生兽”漏洞☆14Updated 9 years ago
- Android-Syscall-Logger☆22Updated 4 years ago
- Print Android Binder Data about TRANSACTION☆23Updated 6 years ago
- An android hook tools based on cydia substrate☆26Updated 9 years ago
- OLLVM_Deobfuscation 是一款ollvm反混淆工具,目前已经能完美实现x86架构Linux平台下,被ollvm混淆过的C/C++代码的反混淆,后续将逐步尝试Android SO文件的反混淆☆21Updated 7 years ago
- ☆32Updated 2 months ago
- IDA Pro plug-in to fix/extract/view RTTI information☆11Updated 7 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆29Updated 5 years ago
- ☆21Updated 5 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- android injext dex☆57Updated 6 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- get android app signature without java api☆33Updated 6 years ago