YoooHaaa / Anti
用于练 手的环境检测的demo
☆66Updated 8 months ago
Related projects: ⓘ
- 一个基于ptrace-seccomp简单的重定向openat的demo☆58Updated last year
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆84Updated 7 months ago
- apatch kpm 模块通用内核读写内存 linux kernel read only support ARM64(based apatch)☆49Updated this week
- ☆38Updated last year
- frida runtime resolves smali☆63Updated last month
- This is a tool used to inject so to any app by ptrace.☆64Updated last year
- 研究内核改机策略☆45Updated 6 months ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆37Updated last year
- 关于Magisk生态的研究☆98Updated 4 months ago
- this is Android Custom Linker by Android12 LinkerSourcesCode☆30Updated 5 months ago
- ☆109Updated 2 years ago
- 自實現Linker的小Demo☆49Updated 2 months ago
- Remap a library to avoid detection☆90Updated 7 months ago
- ☆86Updated this week
- Xposed免root注入so方案, 支持android各个版本☆105Updated 4 months ago
- Dynamic java method hook for Android,Implemented by jvmti☆6Updated 7 months ago
- 安卓绕过ptrace反调试☆66Updated 3 years ago
- Seccomp + Signal Intercept SVC☆87Updated last year
- ☆74Updated 9 months ago
- ☆23Updated this week
- monitor svc calls of android☆71Updated 6 years ago
- frida dump android elf, support spawn and attach mode☆61Updated 5 months ago
- Capture input events of any android application☆34Updated 3 months ago
- ☆18Updated 2 years ago
- 注入so使用dobby的demo☆17Updated 2 years ago
- 劫持Zygote在App启动前注入so☆138Updated last month
- 获取更详细的Java调用栈,即使清除调试信息并混淆也能知道那个方法报错☆12Updated 3 months ago
- ☆62Updated last week
- 修改app包名,实现随机包名,☆38Updated 2 years ago
- ☆110Updated last year