frida / relengLinks
Frida release engineering tools
☆17Updated 3 weeks ago
Alternatives and similar repositories for releng
Users that are interested in releng are comparing it to the libraries listed below
Sorting:
- Getting better stacks and backtraces in Frida☆59Updated last month
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated this week
- Find JNI native methods while the app is running.☆21Updated last year
- Frida's setHardwareWatchpoint tutorial☆63Updated last year
- System Call Hook for ARM64☆204Updated 3 weeks ago
- Featureful library for interacting with unix processes through ptrace, supports x86_64, i686, arm, aarch64 remote function calls☆52Updated last month
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆39Updated last year
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆33Updated last year
- 基于 Unicorn 引擎的轻量级 ARM64 动态追踪模拟工具。支持 IDA Pro、生成 Tenet 日志、本地代码模拟、内存转储、寄存器状态追踪和指令级日志记录。☆166Updated this week
- An LLVM Pass from Hikari-LLVM15☆135Updated 11 months ago
- deobf tx libtprt's obfuscation☆56Updated last year
- App for learnfrida.info☆21Updated 3 years ago
- ☆59Updated 2 years ago
- Code injection on Android without ptrace☆270Updated last year
- Featureful library for iterating and manipulating linux and android application's PLT (Procedure Linkage Table) at runtime☆39Updated last week
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆73Updated last year
- ☆52Updated 6 months ago
- Compile frida scripts into injectable libraries or executables that inject themselfs☆74Updated this week
- Independent hikari☆37Updated 2 weeks ago
- tprt ollvm 反混淆 修改 binja il☆50Updated last year
- Injecting into SELinux-protected system service processes under root on Android.☆50Updated last year
- GitHub Actions to analyse file using IDA☆35Updated last year
- zygisk插件:用于unity游戏hook☆19Updated 3 years ago
- kernel module for modifying device information...☆22Updated 3 months ago
- ☆59Updated 10 months ago
- Mobile app memory view & edit PyQt6 program☆71Updated 8 months ago
- Remote library injection into Android processes, then hooking via various methods☆64Updated last month
- Single-step debugging of native code using frida, stalker, and semaphore☆86Updated last year
- Help us reverse ios more easily☆19Updated 7 months ago
- system call hooking on arm64 linux via a variety of methods☆49Updated 3 years ago