SafaSafari / bypass_libpairipcoreLinks
with this repo you can bypass libpairipcore tamper and signature protection
☆46Updated 8 months ago
Alternatives and similar repositories for bypass_libpairipcore
Users that are interested in bypass_libpairipcore are comparing it to the libraries listed below
Sorting:
- 内核驱动开发工具包 (Kernel Driver Development Kit)☆88Updated last month
- Android aarch64 kernel rootkit(driver module)☆125Updated last month
- ☆34Updated last year
- A zygisk module that hooks `libdexfile.so` to dump dex☆141Updated last month
- Remap a library to avoid detection☆130Updated last year
- A zygisk module that dumps so file from process memory☆94Updated last year
- apatch内核模块用于隐藏mountxxx & maps & smaps的指定内容☆63Updated 10 months ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆55Updated last year
- Android IO redirection implementation, using seccomp user notify mechanism / 使用 seccomp unotify 的 Android 文件重定向实现☆66Updated 2 months ago
- A Kernel module to break the kernel read-only to modify the syscall_table purpose (only in the Linux Arm64 6.6 Kernel test runs properly)…☆41Updated 11 months ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆82Updated 3 years ago
- A Xposed-like library for runtime Java method interception in OpenJDK VM.☆76Updated 4 months ago
- 对目标函数进行trace 只适用于 arm64☆156Updated 4 months ago
- ☆63Updated 3 months ago
- 一个用于抹去ptrace注入部分文件特征的apatch内核模块☆53Updated 2 months ago
- Android aarch64 kernel driver module providing efficient memory operations, touch simulation and IPC. Features include fast memory remapp…☆90Updated 4 months ago
- 自實現Linker的小Demo☆75Updated 7 months ago
- frida runtime resolves smali☆91Updated 8 months ago
- A rootkit for Android.☆60Updated last year
- A POC to detect zygisk☆70Updated 7 months ago
- A header-only C++ library that makes working with the Java Native Interface (JNI) safer and more convenient.☆102Updated 9 months ago
- Draw on Canvas based Overlay with RootService☆19Updated last year
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆66Updated last year
- ☆39Updated last year
- android jni trace for arm64 for magisk module!☆89Updated last month
- C++的内存指针链扫描☆27Updated this week
- A demo app to detect Zygote injections☆108Updated last month
- A linux(android) kernel module that prevents important files from being deleted☆22Updated 11 months ago
- A library for hiding and retrieving imports in ELF binaries.☆186Updated 8 months ago
- Android assembly instruction tracing tool☆138Updated 8 months ago