Thehepta / HeptaManual
☆11Updated last year
Alternatives and similar repositories for HeptaManual
Users that are interested in HeptaManual are comparing it to the libraries listed below
Sorting:
- Android-Syscall-Logger☆22Updated 4 years ago
- ☆31Updated 3 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆31Updated 10 months ago
- Obfuscated Binaries☆29Updated 2 years ago
- A Project for people to study android svc.☆25Updated 2 years ago
- ☆21Updated 5 years ago
- Simple Android ARM&ARM64 GOT Hook☆37Updated 2 years ago
- deobfuscation BR☆46Updated last year
- ☆28Updated 5 months ago
- unicorn demo☆26Updated 4 years ago
- A frida module to parse Elf headers in runtime☆34Updated 5 years ago
- obpo backend server written by golang☆32Updated last year
- search all symbal in ELF file(dlsym can not find)☆32Updated 6 years ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆16Updated last year
- AArch64 inlineHook☆51Updated 2 years ago
- A c++ (jni) implementation of KeyAttestation for Android☆22Updated last year
- try try full features ebpf on android without Pixel 6☆21Updated 2 years ago
- A comprehensive plug-in injection toolset☆30Updated this week
- An approach to utilize auditd under Android 6+☆21Updated 6 years ago
- 使用 frida stalker 实现的 trace☆27Updated 2 years ago
- 检测got hook(使用xhook测试)☆26Updated 3 years ago
- An AIDL interface scanning tool for Android source code.☆31Updated 10 months ago
- You can run Android Runtime in Qiling☆26Updated 2 years ago
- get android app signature without java api☆33Updated 6 years ago
- ☆22Updated 3 years ago
- monitor svc calls of android☆73Updated 6 years ago
- ☆42Updated last year
- ☆52Updated 6 years ago
- Trace jni calls with eBPF on Android☆24Updated 2 years ago
- Android eBPF sample☆48Updated 2 years ago