gmh5225 / AndroidDriveSignityLinks
AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loading of custom drivers
☆65Updated last year
Alternatives and similar repositories for AndroidDriveSignity
Users that are interested in AndroidDriveSignity are comparing it to the libraries listed below
Sorting:
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆38Updated last year
- Easy-to-use Android library for tampering detection, with a sample app included☆55Updated 3 months ago
- Implementation of sllvm obfuscator☆66Updated 2 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆56Updated last year
- Injecting into SELinux-protected system service processes under root on Android.☆41Updated last year
- Getting better stacks and backtraces in Frida☆48Updated 2 weeks ago
- ☆15Updated 4 months ago
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆104Updated 4 years ago
- Frida's setHardwareWatchpoint tutorial☆50Updated 8 months ago
- llvm powered deobfuscation of a vm-based protection☆36Updated 2 months ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆131Updated last year
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆74Updated last year
- LLVM based obfuscation engine☆30Updated last week
- Proof-of-concept code for Android APEX key reuse vulnerability☆95Updated last year
- Kernel Read Write Execute☆84Updated 9 months ago
- ☆53Updated 4 months ago
- system call hooking on arm64 linux via a variety of methods☆50Updated 3 years ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆39Updated 10 months ago
- Toolset which makes possible hiddenly inject code in apps through system libraries☆45Updated 3 weeks ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- App for learnfrida.info☆21Updated 2 years ago
- ☆20Updated 8 months ago
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆36Updated 2 months ago
- Inject shared libraries into processes on Android (real/emulator device supported)☆101Updated last year
- ☆51Updated last year
- An Android kernel driver for reading/writing physical memory. Its use case is limited, as only memory currently present in physical RAM c…☆24Updated 6 months ago
- breaking decompilers☆49Updated last month
- CVE-2025-0087 EoP full PoC☆17Updated 3 months ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆53Updated last week
- Remote library injection into Android processes, then hooking via various methods☆53Updated last month