Anti-Debug and Anti-Memory Dump for Android
☆282Feb 21, 2021Updated 5 years ago
Alternatives and similar repositories for AntiDebugandMemoryDump
Users that are interested in AntiDebugandMemoryDump are comparing it to the libraries listed below
Sorting:
- Is a protect Android App anti any attacks and environments.☆356Dec 28, 2023Updated 2 years ago
- Detect Frida for Android☆796Jun 12, 2021Updated 4 years ago
- A Project for people to study android svc.☆25Aug 12, 2022Updated 3 years ago
- 一个Native层的Android应用防护库(A native layer Android application protection library)☆166Apr 27, 2022Updated 3 years ago
- 对于目前主流android逆向工具的检测☆110Sep 6, 2022Updated 3 years ago
- Dump Memory of Process in Android☆323Mar 30, 2021Updated 4 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆356Jul 21, 2023Updated 2 years ago
- A way to detect magisk hide using an Android feature☆220Feb 2, 2022Updated 4 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆60Aug 11, 2022Updated 3 years ago
- ☆15Jun 24, 2021Updated 4 years ago
- All-in-one android application protection☆257Feb 12, 2025Updated last year
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆478Jun 1, 2020Updated 5 years ago
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆648May 14, 2024Updated last year
- Modify Android linker to provide loading module and hook function☆463Oct 13, 2025Updated 4 months ago
- 修复通过FART dump下来的dex☆29Aug 1, 2020Updated 5 years ago
- ☆58Nov 10, 2021Updated 4 years ago
- Remap a library to avoid detection☆132Feb 1, 2024Updated 2 years ago
- monitor svc calls of android☆74Sep 6, 2018Updated 7 years ago
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆242Feb 22, 2023Updated 3 years ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆152Apr 22, 2024Updated last year
- android memory access trace utility powered by frida framework☆246Apr 2, 2022Updated 3 years ago
- codeless Android hook (experimental)☆69Jul 27, 2022Updated 3 years ago
- Inotify监听测试☆35Apr 17, 2022Updated 3 years ago
- Script to quickly hook natives call to JNI in Android☆625Aug 3, 2023Updated 2 years ago
- ☆33Apr 4, 2022Updated 3 years ago
- android apk反调试工具,反hook、反xposed、反virtual xposed、反substrate☆150May 12, 2019Updated 6 years ago
- 通过内存特征检测frida☆512Nov 5, 2019Updated 6 years ago
- Jnitrace for cpp☆309Apr 7, 2024Updated last year
- smali trace☆207May 22, 2022Updated 3 years ago
- An android Dex protection shell implementation☆894Jan 21, 2026Updated last month
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆215Mar 21, 2023Updated 2 years ago
- a few android analysis tools, jni trace by native hook, Java Object Format to Json for Xposed and Frida☆187Oct 20, 2025Updated 4 months ago
- Tamper detection in Android☆92Mar 27, 2021Updated 4 years ago
- deobfuse compiler☆215Feb 12, 2021Updated 5 years ago
- this is frida trace assemble and register change tools☆172Oct 14, 2023Updated 2 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,818Jul 18, 2023Updated 2 years ago
- ☆958May 7, 2021Updated 4 years ago
- Android system call hook☆228Jan 22, 2025Updated last year
- This is an injection tool that can inject xposed module to debuggable app by jdwp.☆52Feb 22, 2022Updated 4 years ago