frida / libunwind
Frida uses libunwind for generating backtraces on some platforms
☆17Updated 8 months ago
Alternatives and similar repositories for libunwind:
Users that are interested in libunwind are comparing it to the libraries listed below
- ☆32Updated last year
- A frida module to parse Elf headers in runtime☆32Updated 5 years ago
- JNI Helper Plugin☆52Updated 2 months ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Updated 2 years ago
- rewrite dex file☆41Updated 3 years ago
- search all symbal in ELF file(dlsym can not find)☆28Updated 5 years ago
- Load dex on ART in interpret mode☆17Updated 6 years ago
- ☆18Updated 2 years ago
- Start method tracing using Android's internal APIs☆12Updated 7 years ago
- 修改版substrate Hook,使用源码编译成静态库☆14Updated 6 years ago
- Android-Syscall-Logger☆21Updated 4 years ago
- android hide root demo, code from Magisk☆20Updated 6 years ago
- deollvm arm64 based unicorn☆35Updated 5 years ago
- ☆39Updated 7 years ago
- Quick and dirty hacks to explore ART internals☆11Updated 5 years ago
- A runtime patching library for Android.☆20Updated 7 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆18Updated 5 years ago
- Trace Log Generation (CLI) on a target device or emulator : Generating context information of every instruction from a specific point (in…☆21Updated 8 years ago
- Android Dex Protector☆26Updated 7 years ago
- Command line utility for APK fingerprinting☆13Updated 2 years ago
- Trace jni calls with eBPF on Android☆25Updated 2 years ago
- Bypass dynamic linking function restriction on Android by forging caller address☆36Updated 3 years ago
- android应用反调试以及反内存dump代码收集☆30Updated 8 years ago
- OLLVM_Deobfuscation 是一款ollvm反混淆工具,目前已经能完美实现x86架构Linux平台下,被ollvm混淆过的C/C++代码的反混淆,后续将逐步尝试Android SO文件的反混淆☆21Updated 7 years ago
- A command line utility for managing Frida.☆22Updated 2 years ago
- ☆13Updated 4 years ago
- Inspector server for android☆47Updated last year
- substrate framework for android based on frida☆15Updated 4 years ago
- unpack UPX on android.☆35Updated 5 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago