gmh5225 / AndroidDriveSignity
AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loading of custom drivers
☆62Updated 10 months ago
Alternatives and similar repositories for AndroidDriveSignity:
Users that are interested in AndroidDriveSignity are comparing it to the libraries listed below
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆33Updated 8 months ago
- Implementation of sllvm obfuscator☆63Updated 2 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆34Updated last year
- Getting better stacks and backtraces in Frida☆34Updated 6 months ago
- ☆55Updated 3 months ago
- A zygisk module that dumps so file from process memory☆46Updated 3 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆48Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆83Updated 11 months ago
- Kernel Read Write Execute☆85Updated 4 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆65Updated 11 months ago
- Injecting into SELinux-protected system service processes under root on Android.☆37Updated 10 months ago
- Frida's setHardwareWatchpoint tutorial☆25Updated 3 months ago
- App for learnfrida.info☆20Updated 2 years ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆124Updated 8 months ago
- Dynamic injection tool for Linux/Android☆81Updated 3 weeks ago
- Inject shared libraries into processes on Android (real/emulator device supported)☆94Updated 7 months ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆28Updated 5 months ago
- This contains notes and code for my Troopers23 Beyond Java talk☆25Updated last year
- Yet another LLVM-based obfuscator☆110Updated 4 months ago
- ☆18Updated 3 months ago
- IDA Pro 9+ Binary Patching☆42Updated 3 months ago
- IDA plugin to aid with Swift reverse engineering☆25Updated 2 months ago
- ☆47Updated last year
- In-memory ELF shared library loading☆37Updated 2 years ago
- LPE exploit for CVE-2024-0582 (io_uring)☆95Updated 9 months ago
- An x86-64 code virtualizer for VM based obfuscation☆99Updated 3 weeks ago
- The tool can be used to eliminate redundant instructions in a basic block.☆79Updated last year
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆37Updated this week