Is a protect Android App anti any attacks and environments.
☆356Dec 28, 2023Updated 2 years ago
Alternatives and similar repositories for anti_Android
Users that are interested in anti_Android are comparing it to the libraries listed below
Sorting:
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆648May 14, 2024Updated last year
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆478Jun 1, 2020Updated 5 years ago
- dex-vm used to protect the android classes.dex file☆1,080Aug 22, 2025Updated 6 months ago
- 一个Native层的Android应用防护库(A native layer Android application protection library)☆166Apr 27, 2022Updated 3 years ago
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆242Feb 22, 2023Updated 3 years ago
- 对于目前主流android逆向工具的检测☆110Sep 6, 2022Updated 3 years ago
- Anti-Debug and Anti-Memory Dump for Android☆282Feb 21, 2021Updated 5 years ago
- Black Obfuscator is an obfuscator for Android APK DexFile, it can help developer to protect source code by control flow flattening, and m…☆1,081May 3, 2025Updated 9 months ago
- ROM逆向工具☆656Mar 12, 2024Updated last year
- Jnitrace for cpp☆309Apr 7, 2024Updated last year
- An android Dex protection shell implementation☆889Jan 21, 2026Updated last month
- 通过内存特征检测frida☆512Nov 5, 2019Updated 6 years ago
- Modify Android linker to provide loading module and hook function☆463Oct 13, 2025Updated 4 months ago
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆215Mar 21, 2023Updated 2 years ago
- ☆140Dec 28, 2022Updated 3 years ago
- Detect Frida for Android☆796Jun 12, 2021Updated 4 years ago
- ☆378May 8, 2024Updated last year
- DCC (Dex-to-C Compiler) is method-based aot compiler that can translate DEX code to C code.☆1,265Feb 7, 2024Updated 2 years ago
- 一个小脚本,用于trace so中native函数的调用。☆569Aug 7, 2021Updated 4 years ago
- Hide xposed, root, file redirection, etc.☆690Mar 31, 2021Updated 4 years ago
- deobfuse compiler☆215Feb 12, 2021Updated 5 years ago
- smali trace☆207May 22, 2022Updated 3 years ago
- android memory access trace utility powered by frida framework☆246Apr 2, 2022Updated 3 years ago
- ☆15Jun 24, 2021Updated 4 years ago
- ☆18Jun 12, 2022Updated 3 years ago
- arm汇编学习_linker学习笔记_Android逆向学习笔记☆143Nov 28, 2025Updated 3 months ago
- monitor svc calls of android☆74Sep 6, 2018Updated 7 years ago
- Small Apps As PoC to Detect Frida With Frida☆55Mar 16, 2022Updated 3 years ago
- ☆122Mar 18, 2022Updated 3 years ago
- Obfuscator based on LLVM 14.0.6☆891Nov 21, 2024Updated last year
- 基于eBPF的syscall追踪工具,适用于安卓平台☆326Oct 24, 2023Updated 2 years ago
- 基于eBPF的堆栈追踪工具☆1,353Jan 11, 2026Updated last month
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆152Apr 22, 2024Updated last year
- ☆958May 7, 2021Updated 4 years ago
- An OLLVM-CFF Deobfuscation Plugin☆627Dec 5, 2023Updated 2 years ago
- All-in-one android application protection☆257Feb 12, 2025Updated last year
- A library for hiding and retrieving imports in ELF binaries.☆192Apr 18, 2025Updated 10 months ago
- a few android analysis tools, jni trace by native hook, Java Object Format to Json for Xposed and Frida☆187Oct 20, 2025Updated 4 months ago
- Script to quickly hook natives call to JNI in Android☆625Aug 3, 2023Updated 2 years ago