gmh5225 / AndroidDriveSignity
AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loading of custom drivers
☆63Updated last year
Alternatives and similar repositories for AndroidDriveSignity:
Users that are interested in AndroidDriveSignity are comparing it to the libraries listed below
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆34Updated 10 months ago
- Easy-to-use Android library for tampering detection, with a sample app included☆51Updated this week
- Implementation of sllvm obfuscator☆66Updated 2 years ago
- ☆63Updated 6 months ago
- Injecting into SELinux-protected system service processes under root on Android.☆39Updated last year
- A zygisk module that dumps so file from process memory☆51Updated 5 months ago
- App for learnfrida.info☆20Updated 2 years ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆127Updated 11 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆71Updated last year
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆33Updated 7 months ago
- Kernel Read Write Execute☆83Updated 6 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆88Updated last year
- Getting better stacks and backtraces in Frida☆36Updated 9 months ago
- Frida's setHardwareWatchpoint tutorial☆31Updated 5 months ago
- Inject shared libraries into processes on Android (real/emulator device supported)☆95Updated 10 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆52Updated last year
- ☆50Updated last year
- system call hooking on arm64 linux via a variety of methods☆47Updated 2 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆52Updated last week
- ☆49Updated last month
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆25Updated 4 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆25Updated last year
- An x86-64 code virtualizer for VM based obfuscation☆109Updated 3 months ago
- ☆18Updated 5 months ago
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆90Updated last year
- Kotoamatsukami is an obfuscator based on LLVM-17, utilizing LLVM's new pass to implement plug-in features, for obfuscating multiple langu…☆35Updated 3 weeks ago
- Toolset which makes possible hiddenly inject code in apps through system libraries☆32Updated last month
- Shared object ELF Process injection and loading resources.☆9Updated 6 months ago
- IDA plugin to aid with Swift reverse engineering☆28Updated 4 months ago