gmh5225 / AndroidDriveSignity
AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loading of custom drivers
☆64Updated last year
Alternatives and similar repositories for AndroidDriveSignity:
Users that are interested in AndroidDriveSignity are comparing it to the libraries listed below
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆37Updated 11 months ago
- Easy-to-use Android library for tampering detection, with a sample app included☆51Updated last month
- Implementation of sllvm obfuscator☆66Updated 2 years ago
- Getting better stacks and backtraces in Frida☆38Updated 10 months ago
- Frida's setHardwareWatchpoint tutorial☆31Updated 6 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆72Updated last year
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- ☆50Updated last year
- ☆50Updated 2 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆52Updated last year
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆130Updated last year
- Inject shared libraries into processes on Android (real/emulator device supported)☆97Updated 11 months ago
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆104Updated 4 years ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆37Updated 8 months ago
- App for learnfrida.info☆21Updated 2 years ago
- system call hooking on arm64 linux via a variety of methods☆49Updated 2 years ago
- Injecting into SELinux-protected system service processes under root on Android.☆39Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆89Updated last year
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆117Updated last week
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆53Updated this week
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆27Updated last week
- Code injection on Android without ptrace☆235Updated last year
- Featureful library for interacting with unix processes through ptrace, supports x86_64, i686, arm, aarch64 remote function calls☆42Updated 2 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆88Updated last year
- In-memory ELF shared library loading☆40Updated 2 years ago
- Android Overlay Hijack☆23Updated 7 months ago
- tprt ollvm 反混淆 修改 binja il☆39Updated 7 months ago
- The tool can be used to eliminate redundant instructions in a basic block.☆80Updated last year
- Toolset which makes possible hiddenly inject code in apps through system libraries☆38Updated 2 months ago
- LLDB based debugger for Linux Kernel☆23Updated 2 weeks ago