apkunpacker / ARMFingerprintLinks
Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.
☆27Updated 6 months ago
Alternatives and similar repositories for ARMFingerprint
Users that are interested in ARMFingerprint are comparing it to the libraries listed below
Sorting:
- GitHub Actions to analyse file using IDA☆35Updated last year
- deobfuscation BR☆53Updated last year
- Single-step debugging of native code using frida, stalker, and semaphore☆86Updated last year
- ☆29Updated 7 months ago
- ☆33Updated 3 years ago
- Android assembly instruction tracing tool☆141Updated 9 months ago
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆73Updated last year
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago
- Root takeover via signature spoofing in KernelSU☆19Updated 2 years ago
- Inotify监听测试☆35Updated 3 years ago
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆39Updated 10 months ago
- monitor svc calls of android☆74Updated 7 years ago
- APatch KernelPatch QEMU Debug Environment☆21Updated last year
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆58Updated last year
- hwBreakpoint Test App☆19Updated 3 years ago
- ☆34Updated last year
- deobf tx libtprt's obfuscation☆56Updated last year
- 更稳定的劫持Zygote在App启动前注入so☆128Updated 2 weeks ago
- Resume FuncOutline by idapython☆28Updated last year
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆17Updated last year
- ☆11Updated 11 months ago
- ARM64 DBI DEMO☆34Updated 2 months ago
- My own tools for developing kernel modules☆15Updated 4 months ago
- Obfuscated Binaries☆32Updated 2 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆24Updated 2 years ago
- llvm with customised obfuscation optimisations☆15Updated last year
- IDA plugin which queries Local language models to speed up reverse-engineering☆23Updated last year
- ☆26Updated 2 weeks ago
- ☆39Updated 3 months ago
- 使用 frida stalker 实现的 trace☆29Updated 3 years ago