Umiade / xlinkerLinks
Custom linker implemented with Segmentation Fault handler
☆21Updated 5 years ago
Alternatives and similar repositories for xlinker
Users that are interested in xlinker are comparing it to the libraries listed below
Sorting:
- Android-Syscall-Logger☆22Updated 4 years ago
- a poc implementation arm64 tracer based on simulation☆63Updated 4 years ago
- A frida module to parse Elf headers in runtime☆35Updated 6 years ago
- Simple Android ARM&ARM64 GOT Hook☆37Updated 3 years ago
- A Project for people to study android svc.☆25Updated 3 years ago
- Android eBPF sample☆47Updated 3 years ago
- read process memory with process_vm_readv☆16Updated 5 years ago
- ☆32Updated 3 years ago
- rewrite dex file☆42Updated 3 years ago
- substrate framework for android based on frida☆16Updated 5 years ago
- try try full features ebpf on android without Pixel 6☆21Updated 2 years ago
- monitor svc calls of android☆73Updated 6 years ago
- Trace jni calls with eBPF on Android☆24Updated 3 years ago
- get android app signature without java api☆35Updated 6 years ago
- ARM Emulator Developing(interp + jit + aot)☆28Updated 5 years ago
- ☆52Updated 6 years ago
- IDA Python Script for anti ollvm-arm☆29Updated 3 years ago
- android injext dex☆57Updated 6 years ago
- Print Android Binder Data about TRANSACTION☆23Updated 6 years ago
- AArch64 inlineHook☆53Updated 3 years ago
- unicorn demo☆26Updated 4 years ago
- Bypass dynamic linking function restriction on Android by forging caller address☆41Updated 3 years ago
- ☆21Updated 5 years ago
- translator from dex bytecode into LLVM ir☆53Updated 3 years ago
- android应用反调试以及反内存dump代码收集☆31Updated 9 years ago
- Reverse Engineering about 360 android app guard☆58Updated 5 years ago
- An approach to utilize auditd under Android 6+☆22Updated 7 years ago
- 帮助逆向者使用ida便利地调试apk so文件,抛开调试前的那些麻烦步骤☆44Updated 3 years ago
- deobfuscation BR☆51Updated last year
- 不依赖llvm源码,独立ollvm☆15Updated 4 years ago