frida / frida-java-bridgeLinks
Java runtime interop from Frida
☆393Updated last week
Alternatives and similar repositories for frida-java-bridge
Users that are interested in frida-java-bridge are comparing it to the libraries listed below
Sorting:
- Engine used by jnitrace to intercept JNI API calls.☆330Updated 2 years ago
- 通过内存特征检测frida☆507Updated 6 years ago
- 利用 frida 获取 Jni RegisterNatives 动态注册的函数☆351Updated 2 years ago
- Script to quickly hook natives call to JNI in Android☆619Updated 2 years ago
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆645Updated last year
- Android 加固应用Hook方式-Frida☆289Updated 3 years ago
- Inject frida agents on local processes through an Android app☆271Updated 4 years ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆473Updated 5 years ago
- Allows you to partly emulate an Android native library.☆360Updated 5 years ago
- Android内联hook框架☆336Updated 6 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆654Updated 10 months ago
- ☆374Updated last year
- this unpack script for Android O and Android P☆309Updated 6 years ago
- An improved version of AndroidNativeEmu,Allow running android elf on PC☆698Updated 2 years ago
- Example Frida agent written in TypeScript☆884Updated 3 months ago
- ☆946Updated 4 years ago
- Is a protect Android App anti any attacks and environments.☆355Updated 2 years ago
- The second generation Android Hardening Protection☆407Updated 7 years ago
- 🔨 Break Java Reverse Engineering form Memory World!☆866Updated 2 years ago
- Modify Android linker to provide loading module and hook function☆460Updated 3 months ago
- strongR-frida☆220Updated 4 years ago
- Runs frida-server on boot as root with magisk.☆217Updated 2 years ago
- 一个小脚本,用于trace so中native函数的调用。☆566Updated 4 years ago
- Dump Memory of Process in Android☆317Updated 4 years ago
- Jnitrace for cpp☆305Updated last year
- A couple of methods for detecting Frida on Android.☆492Updated 3 years ago
- A frida script implement XposedBridge & load xposed modules, without installing xposed framwork.☆211Updated 4 years ago
- 梆梆企业加固详细逆向分析过程, 包含两种对该加固的脱壳机(直接解密classes0.jar和基于frida hook)☆474Updated 6 years ago
- android memory access trace utility powered by frida framework☆246Updated 3 years ago
- ☆239Updated 4 years ago