chame1eon / jnitrace-engine
Engine used by jnitrace to intercept JNI API calls.
☆314Updated last year
Alternatives and similar repositories for jnitrace-engine:
Users that are interested in jnitrace-engine are comparing it to the libraries listed below
- 利用 frida 获取 Jni RegisterNatives 动态注册的函数☆325Updated last year
- Script to quickly hook natives call to JNI in Android☆555Updated last year
- Inject frida agents on local processes through an Android app☆266Updated 3 years ago
- ☆315Updated 9 months ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆228Updated 4 years ago
- 通过内存特征检测frida☆478Updated 5 years ago
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆575Updated 9 months ago
- Android 加固应用Hook方式-Frida☆277Updated 2 years ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆440Updated 4 years ago
- ☆328Updated last year
- ☆153Updated 5 years ago
- android memory access trace utility powered by frida framework☆234Updated 2 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆575Updated last week
- Jnitrace for cpp☆264Updated 10 months ago
- strongR-frida☆200Updated 3 years ago
- 整理一些unidbg常用的工具在这里☆329Updated 3 years ago
- 一个小脚本,用于trace so中native函数的调用。☆514Updated 3 years ago
- An improved version of AndroidNativeEmu,Allow running android elf on PC☆672Updated last year
- Generic Script To Bypass Some AntiFrida Checks☆444Updated 5 months ago
- Common IDA scripts for effective Reverse Enginnering☆166Updated 2 years ago
- Dump Memory of Process in Android☆273Updated 3 years ago
- Java runtime interop from Frida☆337Updated 2 weeks ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆339Updated last year
- ☆238Updated 3 years ago