Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".
☆735Sep 11, 2025Updated 5 months ago
Alternatives and similar repositories for binder-trace
Users that are interested in binder-trace are comparing it to the libraries listed below
Sorting:
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆197Jun 15, 2024Updated last year
- Code injection on Android without ptrace☆280Mar 20, 2024Updated last year
- A binder interceptor framework for Android☆366Jun 24, 2024Updated last year
- Android system call hook☆228Jan 22, 2025Updated last year
- 基于eBPF的堆栈追踪工具☆1,353Jan 11, 2026Updated last month
- ☆137May 1, 2023Updated 2 years ago
- eBPF-based lightweight debugger for Android☆755Dec 27, 2025Updated 2 months ago
- 劫持Zygote在App启动前注入so☆347Jan 22, 2026Updated last month
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.☆159Feb 4, 2026Updated 3 weeks ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆99Jan 21, 2024Updated 2 years ago
- ☆175Jun 27, 2025Updated 8 months ago
- Single-step debugging of native code using frida, stalker, and semaphore☆87Oct 9, 2024Updated last year
- Instruction tracer powered by Frida☆153Jun 9, 2025Updated 8 months ago
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆648May 14, 2024Updated last year
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆356Jul 21, 2023Updated 2 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,818Jul 18, 2023Updated 2 years ago
- Injects frida gadget using zygisk to bypass anti-tamper checks.☆912Oct 18, 2025Updated 4 months ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆82Dec 13, 2022Updated 3 years ago
- Android 14 kernel exploit for Pixel7/8 Pro☆541Apr 23, 2024Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆580Nov 5, 2025Updated 3 months ago
- ☆59Aug 30, 2023Updated 2 years ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆339Apr 12, 2023Updated 2 years ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆127Jan 26, 2024Updated 2 years ago
- LLEF is a plugin for LLDB to make it more useful for RE and VR☆459Jan 8, 2026Updated last month
- ☆86Sep 19, 2024Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆280May 27, 2023Updated 2 years ago
- A Dynamic Binary Instrumentation framework based on LLVM.☆1,730Feb 20, 2026Updated last week
- Mobile Edge-Dynamic Unified Security Analysis☆2,179Feb 17, 2026Updated last week
- Significant security enchancements of recent major Android versions.☆184Jul 10, 2025Updated 7 months ago
- A tool that traces system calls using eBPF☆268Oct 31, 2024Updated last year
- Remap a library to avoid detection☆132Feb 1, 2024Updated 2 years ago
- PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from…☆170Sep 30, 2024Updated last year
- eBPF-Based DexDumper for Android☆367Dec 8, 2025Updated 2 months ago
- ☆53Jul 11, 2023Updated 2 years ago
- A library for hiding and retrieving imports in ELF binaries.☆192Apr 18, 2025Updated 10 months ago
- eBPF Android Debug Bridge☆547Mar 30, 2024Updated last year
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆663Feb 24, 2025Updated last year
- Xposed免root注入so方案, 支持android各个版本☆242May 1, 2024Updated last year
- 关于Magisk生态的研究☆160Apr 29, 2024Updated last year