dave-tucker / syscall-digestLinks
☆15Updated 3 years ago
Alternatives and similar repositories for syscall-digest
Users that are interested in syscall-digest are comparing it to the libraries listed below
Sorting:
- Featureful library for iterating and manipulating linux and android application's PLT (Procedure Linkage Table) at runtime☆39Updated this week
- Custom linker implemented with Segmentation Fault handler☆22Updated 6 years ago
- read process memory with process_vm_readv☆16Updated 5 years ago
- hook or replace arbitary linux kernel functions in runtime, supporting arm32, arm64, x86, x86_64☆216Updated last month
- Remote library injection into Android processes, then hooking via various methods☆64Updated last month
- Do something to fit android aarch64 to develop ebpf programs using libbpf-bootstrap framework☆44Updated 2 years ago
- Run command with specific selinux context for Android☆29Updated 3 years ago
- BTFHub, but for Android☆38Updated 2 years ago
- try try full features ebpf on android without Pixel 6☆22Updated 3 years ago
- elf loader implementation in rust☆14Updated 7 years ago
- ☆15Updated 4 years ago
- ☆37Updated 6 months ago
- Moved: https://codeberg.org/koutheir/selinux☆23Updated last year
- stupid ptrace tricks☆12Updated 4 years ago
- A kernel module for tracing signal☆31Updated 2 years ago
- Featureful library for interacting with unix processes through ptrace, supports x86_64, i686, arm, aarch64 remote function calls☆52Updated last month
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆26Updated last year
- Trace Android framework API, native libraries, system calls and other events using eBPF☆155Updated last year
- ☆13Updated 5 years ago
- Loadable Kernel Module for Android☆77Updated 6 years ago
- Trace jni calls with eBPF on Android☆24Updated 3 years ago
- The standalone version of the libunwindstack from Android.☆28Updated last year
- ☆84Updated last year
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆42Updated last year
- A frida module to parse Elf headers in runtime☆37Updated 6 years ago
- Root takeover via signature spoofing in KernelSU☆19Updated 2 years ago
- Simple Android ARM&ARM64 GOT Hook☆37Updated 3 years ago
- ☆37Updated last year
- Run `strace` on program that is under another debugger☆18Updated 2 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Updated 6 years ago