gamesarchive / CVE-2025-48543Links
PoC exploit for CVE-2025-48543 in C++
☆36Updated 2 months ago
Alternatives and similar repositories for CVE-2025-48543
Users that are interested in CVE-2025-48543 are comparing it to the libraries listed below
Sorting:
- 2023 年 羊城杯 ezAndroid dex VMP 恢复工具☆36Updated last year
- Android assembly instruction tracing tool☆125Updated 7 months ago
- 一个基于uprobe,能同时hook大量用户地址空间函数的kpm内核模块☆169Updated 4 months ago
- frida runtime resolves smali☆89Updated 6 months ago
- ☆38Updated 4 months ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆193Updated last year
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆53Updated last year
- A Simple uprobe Hook Framework☆63Updated 7 months ago
- ☆28Updated 5 months ago
- Android aarch64 kernel rootkit(driver module)☆105Updated last month
- 研究内核改机策略☆66Updated last year
- deobfuscation BR☆52Updated last year
- 反ida内联汇编花指令☆53Updated 2 years ago
- Small Apps As PoC to Detect Frida With Frida☆55Updated 3 years ago
- 用于练手的环境检测的demo☆88Updated last year
- Android arm arm64-v8a ShellCode Generate☆29Updated 4 months ago
- 自實現Linker的小Demo☆74Updated 5 months ago
- Single-step debugging of native code using frida, stalker, and semaphore☆82Updated last year
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆36Updated 8 months ago
- ☆86Updated 8 months ago
- 对目标函数进行trace 只适用于 arm64☆109Updated 2 months ago
- android jni trace for arm64 for magisk module!☆85Updated 2 months ago
- monitor svc calls of android☆72Updated 7 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆22Updated last year
- ☆58Updated 9 months ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆123Updated last year
- ☆122Updated 2 years ago
- VirtualApp 原理速览☆46Updated 6 months ago
- ☆58Updated 2 years ago
- fla反混淆☆52Updated 3 months ago