SsageParuders / Android_SVC_Edu
A Project for people to study android svc.
☆25Updated 2 years ago
Alternatives and similar repositories for Android_SVC_Edu:
Users that are interested in Android_SVC_Edu are comparing it to the libraries listed below
- Inotify监听测试☆33Updated 2 years ago
- Android-Syscall-Logger☆21Updated 3 years ago
- hwBreakpoint Test App☆17Updated 2 years ago
- try try full features ebpf on android without Pixel 6☆21Updated 2 years ago
- ☆29Updated 2 years ago
- Android eBPF sample☆47Updated 2 years ago
- linux x86_64 and arm64 syscall hook☆19Updated last year
- A kernel module for tracing signal☆27Updated 2 years ago
- A rootkit for Android.☆48Updated 8 months ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆44Updated 8 months ago
- Hook native with xposed☆17Updated 2 years ago
- Trace jni calls with eBPF on Android☆25Updated 2 years ago
- Simple Android ARM&ARM64 GOT Hook☆35Updated 2 years ago
- ☆26Updated last month
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆58Updated 2 years ago
- 来自大表哥的剑☆24Updated 5 years ago
- substrate framework for android based on frida☆15Updated 4 years ago
- 转换Pxx的vmp文件(check.bin, mw.bin)到.class☆28Updated last year
- deobfuscation BR☆41Updated 11 months ago
- An approach to utilize auditd under Android 6+☆21Updated 6 years ago
- 研究内核改机策略☆54Updated 11 months ago
- zygisk插件:用于unity游戏hook☆16Updated 2 years ago
- A c++ (jni) implementation of KeyAttestation for Android☆19Updated 11 months ago
- monitor svc calls of android☆72Updated 6 years ago
- this is Android Custom Linker by Android12 LinkerSourcesCode☆37Updated 10 months ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆16Updated 9 months ago
- 检测got hook(使用xhook测试)☆25Updated 3 years ago
- android8 arm64 注入方案☆36Updated 3 years ago
- get android app signature without java api☆33Updated 6 years ago
- APatch KernelPatch QEMU Debug Environment☆16Updated 5 months ago