frida / libunwind
Frida uses libunwind for generating backtraces on some platforms
☆17Updated 2 months ago
Related projects: ⓘ
- ☆32Updated 9 months ago
- search all symbal in ELF file(dlsym can not find)☆27Updated 5 years ago
- rewrite dex file☆40Updated 2 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Updated 2 years ago
- Load dex on ART in interpret mode☆17Updated 5 years ago
- A frida module to parse Elf headers in runtime☆30Updated 5 years ago
- Quick and dirty hacks to explore ART internals☆11Updated 4 years ago
- JNI Helper Plugin☆52Updated 3 years ago
- read process memory with process_vm_readv☆17Updated 4 years ago
- ARTist's deployment application, for code-injection on an Android device.☆37Updated 5 years ago
- 修改版substrate Hook,使用源码编译成静态库☆13Updated 5 years ago
- ☆34Updated this week
- ☆14Updated 8 years ago
- A runtime patching library for Android.☆20Updated 7 years ago
- An Xposed plugin loader without rebooting the phone☆3Updated 2 years ago
- Create an outbound stream over a message transport.☆19Updated 7 months ago
- Android-Syscall-Logger☆18Updated 3 years ago
- Android Injector☆23Updated 7 years ago
- ☆18Updated 2 years ago
- ☆19Updated this week
- unpack UPX on android.☆34Updated 5 years ago
- deollvm arm64 based unicorn☆34Updated 5 years ago
- ☆20Updated 8 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆18Updated 4 years ago
- Code profiler based on Frida☆29Updated 3 years ago
- Trace jni calls with eBPF on Android☆24Updated 2 years ago
- Start method tracing using Android's internal APIs☆10Updated 6 years ago
- Android Cryptographic primitives hooking plugin for JEB☆17Updated 5 years ago
- 娜迦DEX文件修复程序☆24Updated 7 years ago