Is a protect Android App anti any attacks and environments.
☆356Dec 28, 2023Updated 2 years ago
Alternatives and similar repositories for anti_Android
Users that are interested in anti_Android are comparing it to the libraries listed below
Sorting:
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆649May 14, 2024Updated last year
- 一个Native层的Android应用防护库(A native layer Android application protection library)☆168Apr 27, 2022Updated 3 years ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆479Jun 1, 2020Updated 5 years ago
- dex-vm used to protect the android classes.dex file☆1,085Aug 22, 2025Updated 6 months ago
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆243Feb 22, 2023Updated 3 years ago
- Anti-Debug and Anti-Memory Dump for Android☆282Feb 21, 2021Updated 5 years ago
- 对于目前主流android逆向工具的检测☆110Sep 6, 2022Updated 3 years ago
- ROM逆向工具☆656Mar 12, 2024Updated 2 years ago
- Jnitrace for cpp☆309Apr 7, 2024Updated last year
- ☆18Jun 12, 2022Updated 3 years ago
- Black Obfuscator is an obfuscator for Android APK DexFile, it can help developer to protect source code by control flow flattening, and m…☆1,088May 3, 2025Updated 10 months ago
- 通过内存特征检测frida☆514Nov 5, 2019Updated 6 years ago
- An android Dex protection shell implementation☆909Mar 6, 2026Updated 2 weeks ago
- Modify Android linker to provide loading module and hook function☆465Oct 13, 2025Updated 5 months ago
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆215Mar 21, 2023Updated 3 years ago
- monitor svc calls of android☆74Sep 6, 2018Updated 7 years ago
- ☆379May 8, 2024Updated last year
- DCC (Dex-to-C Compiler) is method-based aot compiler that can translate DEX code to C code.☆1,271Feb 7, 2024Updated 2 years ago
- ☆140Dec 28, 2022Updated 3 years ago
- smali trace☆207May 22, 2022Updated 3 years ago
- deobfuse compiler☆215Feb 12, 2021Updated 5 years ago
- Hide xposed, root, file redirection, etc.☆691Mar 31, 2021Updated 4 years ago
- Detect Frida for Android☆797Jun 12, 2021Updated 4 years ago
- 一个小脚本,用于trace so中native函数的调用。☆570Aug 7, 2021Updated 4 years ago
- 基于eBPF的syscall追踪工具,适用于安卓平台☆328Oct 24, 2023Updated 2 years ago
- ☆122Mar 18, 2022Updated 4 years ago
- android memory access trace utility powered by frida framework☆248Apr 2, 2022Updated 3 years ago
- 基于eBPF的堆栈追踪工具☆1,373Jan 11, 2026Updated 2 months ago
- Obfuscator based on LLVM 14.0.6☆895Nov 21, 2024Updated last year
- An OLLVM-CFF Deobfuscation Plugin☆627Dec 5, 2023Updated 2 years ago
- arm汇编学习_linker学习笔记_Android逆向学习笔记☆145Nov 28, 2025Updated 3 months ago
- Small Apps As PoC to Detect Frida With Frida☆55Mar 16, 2022Updated 4 years ago
- ☆175Jun 27, 2025Updated 8 months ago
- Remap a library to avoid detection☆132Feb 1, 2024Updated 2 years ago
- Android system call hook☆229Jan 22, 2025Updated last year
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆153Apr 22, 2024Updated last year
- ☆15Jun 24, 2021Updated 4 years ago
- a few android analysis tools, jni trace by native hook, Java Object Format to Json for Xposed and Frida☆187Oct 20, 2025Updated 5 months ago
- ☆972May 7, 2021Updated 4 years ago