gmh5225 / AndroidDriveSignityLinks
AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loading of custom drivers
☆65Updated last year
Alternatives and similar repositories for AndroidDriveSignity
Users that are interested in AndroidDriveSignity are comparing it to the libraries listed below
Sorting:
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆39Updated last year
- Easy-to-use Android library for tampering detection, with a sample app included☆57Updated 4 months ago
- Getting better stacks and backtraces in Frida☆50Updated last month
- Binary Ninja plugin to analyze and simplify obfuscated code☆161Updated last month
- Injecting into SELinux-protected system service processes under root on Android.☆45Updated last year
- Frida's setHardwareWatchpoint tutorial☆52Updated 9 months ago
- Implementation of sllvm obfuscator☆66Updated 2 years ago
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆105Updated 4 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆174Updated 3 months ago
- llvm powered deobfuscation of a vm-based protection☆39Updated 3 months ago
- ☆18Updated last month
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆79Updated last year
- system call hooking on arm64 linux via a variety of methods☆50Updated 3 years ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆134Updated last year
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆42Updated 3 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆97Updated last year
- Kernel mode to user mode so injection☆91Updated 4 years ago
- dynamic binary instrumentation, analysis, and patching framework☆73Updated 2 weeks ago
- Tools to bypass flawed SELinux policies using the init_module system call☆57Updated last year
- Some Of Anti-Frida Stuff☆126Updated 3 years ago
- ☆51Updated last year
- An IDA Pro plugin that display cross-references to functions or variables across the entire binary in Hex-Rays pseudocode☆114Updated last month
- LLVM based obfuscation engine☆95Updated last month
- Code injection on Android without ptrace☆249Updated last year
- App for learnfrida.info☆21Updated 3 years ago
- Dynamic injection tool for Linux/Android☆166Updated 7 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆89Updated last year
- A collection of Proof-of-Concept implementations of various anti-disassembly techniques for ARM32 and ARM64 architectures.☆72Updated 3 months ago
- ☆54Updated 5 months ago