SsageParuders / Android_SVC_EduLinks
A Project for people to study android svc.
☆25Updated 2 years ago
Alternatives and similar repositories for Android_SVC_Edu
Users that are interested in Android_SVC_Edu are comparing it to the libraries listed below
Sorting:
- try try full features ebpf on android without Pixel 6☆21Updated 2 years ago
- Android-Syscall-Logger☆22Updated 4 years ago
- Android eBPF sample☆47Updated 3 years ago
- Inotify监听测试☆34Updated 3 years ago
- APatch KernelPatch QEMU Debug Environment☆22Updated 10 months ago
- Hook native with xposed☆18Updated 3 years ago
- ☆32Updated 3 years ago
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆32Updated 4 months ago
- A kernel module for tracing signal☆29Updated 2 years ago
- An AIDL interface scanning tool for Android source code.☆31Updated last year
- monitor svc calls of android☆73Updated 6 years ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆52Updated last year
- android8 arm64 注入方案☆36Updated 4 years ago
- 研究内核改机策略☆63Updated last year
- ☆15Updated 4 years ago
- deobfuscation BR☆51Updated last year
- Simple Android ARM&ARM64 GOT Hook☆37Updated 3 years ago
- Trace jni calls with eBPF on Android☆24Updated 3 years ago
- AArch64 inlineHook☆53Updated 3 years ago
- linux x86_64 and arm64 syscall hook☆20Updated last year
- a poc implementation arm64 tracer based on simulation☆63Updated 3 years ago
- ☆18Updated 3 years ago
- 使用 frida stalker 实现的 trace☆29Updated 2 years ago
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆17Updated last week
- hwBreakpoint Test App☆19Updated 2 years ago
- A comprehensive plug-in injection toolset☆34Updated last month
- deobf tx libtprt's obfuscation☆46Updated 11 months ago
- An approach to utilize auditd under Android 6+☆22Updated 6 years ago
- ida 对抗 花指令, 基于 ida 7.5 sdk 编写☆19Updated last year
- Custom linker implemented with Segmentation Fault handler☆21Updated 5 years ago