An eBPF-powered debugger server for linux and android.
☆136Feb 27, 2026Updated this week
Alternatives and similar repositories for edbgserver
Users that are interested in edbgserver are comparing it to the libraries listed below
Sorting:
- 一个用于检测安卓app自身是否被uprobe挂载的示例项目☆27Jul 4, 2025Updated 8 months ago
- aosp sources without prebuilts☆16Nov 23, 2023Updated 2 years ago
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆28Jul 23, 2025Updated 7 months ago
- Android Shared Library Mod Injector (Ptrace). Android 5 ~ 14 (arm, arm64, x86, x86_64) + Emulator.☆17Sep 28, 2024Updated last year
- Inotify监听测试☆35Apr 17, 2022Updated 3 years ago
- A simple android NativeHook library.☆119May 19, 2025Updated 9 months ago
- Android assembly instruction tracing tool☆142Apr 17, 2025Updated 10 months ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆199Jun 15, 2024Updated last year
- Android 16 最新保活方案和无权限体外弹出方案,☆149Feb 20, 2026Updated last week
- 一个基于uprobe,能同时hook大量用户地址空间函数的kpm内核模块☆187Feb 13, 2026Updated 2 weeks ago
- Find JNI native methods while the app is running.☆21Oct 26, 2024Updated last year
- with this repo you can bypass libpairipcore tamper and signature protection☆55Apr 21, 2025Updated 10 months ago
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆74Oct 22, 2024Updated last year
- ☆30Feb 11, 2026Updated 3 weeks ago
- Help us reverse ios more easily☆20May 30, 2025Updated 9 months ago
- Android Emulator with Newest Security Patch☆28Mar 4, 2025Updated last year
- apatch kpm 模块通用内核读写内存 linux kernel read only support ARM64(based apatch)☆66Jan 13, 2026Updated last month
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆17May 8, 2024Updated last year
- 反ida内联汇编花指令☆54Jul 3, 2023Updated 2 years ago
- frida打印java调用栈的详细信息☆40Feb 14, 2025Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆24Dec 25, 2023Updated 2 years ago
- eBPF-based lightweight debugger for Android☆757Dec 27, 2025Updated 2 months ago
- System Call Hook for ARM64☆213Jan 19, 2026Updated last month
- ☆23Dec 16, 2025Updated 2 months ago
- A comprehensive plug-in injection toolset☆42Jan 29, 2026Updated last month
- frida runtime resolves smali☆92Jan 24, 2026Updated last month
- ☆39Jan 10, 2025Updated last year
- 对目标函数进行trace 只适用于 arm64☆167Aug 30, 2025Updated 6 months ago
- Mobile app memory view & edit PyQt6 program☆74May 1, 2025Updated 10 months ago
- AntiOllvm Fla with Fake Runtime☆182Jan 8, 2025Updated last year
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆39Mar 13, 2025Updated 11 months ago
- Android IO redirection implementation, using seccomp user notify mechanism / 使用 seccomp unotify 的 Android 文件重定向实现☆71Oct 22, 2025Updated 4 months ago
- 劫持Zygote在App启动前注入so☆349Jan 22, 2026Updated last month
- apatch内核模块 用于文件重定向☆75Mar 19, 2025Updated 11 months ago
- ☆175Jun 27, 2025Updated 8 months ago
- vmtrace的发布仓库,相关so 调用脚本例子都会放在里面☆539Dec 26, 2025Updated 2 months ago
- A Project for people to study android svc.☆25Aug 12, 2022Updated 3 years ago
- From: https://gitlab.com/simonpunk/susfs4ksu/☆23Feb 3, 2026Updated last month
- A kernel module for tracing signal☆31Jan 17, 2023Updated 3 years ago