Taardisaa / frida_qbdi_hookLinks
a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).
☆23Updated last year
Alternatives and similar repositories for frida_qbdi_hook
Users that are interested in frida_qbdi_hook are comparing it to the libraries listed below
Sorting:
- Single-step debugging of native code using frida, stalker, and semaphore☆82Updated last year
- It can help you better use Frida in SO binaries☆34Updated 2 years ago
- 使用 frida stalker 实现的 trace☆29Updated 2 years ago
- monitor svc calls of android☆72Updated 7 years ago
- ☆27Updated 4 months ago
- 研究内核改机策略☆62Updated last year
- Android assembly instruction tracing tool☆121Updated 6 months ago
- deobfuscation BR☆52Updated last year
- frida runtime resolves smali☆87Updated 5 months ago
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆33Updated 7 months ago
- A zygisk module that dumps so file from process memory☆90Updated last year
- Obfuscated Binaries☆29Updated 2 years ago
- Combine Dobby and QBDI☆26Updated last year
- frida打印java调用栈的详细信息☆38Updated 8 months ago
- GitHub Actions to analyse file using IDA☆30Updated 11 months ago
- ☆32Updated 3 years ago
- ☆57Updated 3 years ago
- vm 还原的分享☆72Updated last year
- 一个用于抹去ptrace注入部分文件特征的apatch内核模块☆49Updated this week
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 3 months ago
- 2023 年 羊城杯 ezAndroid dex VMP 恢复工具☆36Updated last year
- Android aarch64 kernel rootkit(driver module)☆101Updated last week
- 反ida内联汇编花指令☆53Updated 2 years ago
- ☆55Updated 3 months ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆59Updated 3 years ago
- 反反frida调试☆24Updated 2 years ago
- android jni trace for arm64 for magisk module!☆84Updated last month
- Root takeover via signature spoofing in KernelSU☆18Updated 2 years ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆53Updated last year
- deobf tx libtprt's obfuscation☆49Updated last year