gmh5225 / AndroidDriveSignityLinks
AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loading of custom drivers
☆65Updated last year
Alternatives and similar repositories for AndroidDriveSignity
Users that are interested in AndroidDriveSignity are comparing it to the libraries listed below
Sorting:
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆39Updated last year
- Easy-to-use Android library for tampering detection, with a sample app included☆58Updated 5 months ago
- Injecting into SELinux-protected system service processes under root on Android.☆44Updated last year
- Binary Ninja plugin to analyze and simplify obfuscated code☆163Updated 2 months ago
- Implementation of sllvm obfuscator☆65Updated 2 years ago
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆106Updated 4 years ago
- Getting better stacks and backtraces in Frida☆53Updated last month
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆100Updated last year
- llvm powered deobfuscation of a vm-based protection☆41Updated 4 months ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆36Updated last year
- Frida's setHardwareWatchpoint tutorial☆57Updated 11 months ago
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆43Updated 5 months ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆136Updated last year
- Kernel mode to user mode so injection☆91Updated 4 years ago
- ☆22Updated 2 months ago
- ☆19Updated 11 months ago
- system call hooking on arm64 linux via a variety of methods☆50Updated 3 years ago
- LLVM based obfuscation engine☆100Updated 2 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆100Updated last year
- Tools to bypass flawed SELinux policies using the init_module system call☆58Updated last year
- dynamic binary instrumentation, analysis, and patching framework☆94Updated 2 weeks ago
- In-memory ELF shared library loading☆44Updated 2 years ago
- A collection of Proof-of-Concept implementations of various anti-disassembly techniques for ARM32 and ARM64 architectures.☆73Updated 4 months ago
- CVE-2025-0087 EoP full PoC☆21Updated 6 months ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆54Updated last week
- breaking decompilers☆51Updated 4 months ago
- An IDA plugin that can be used to partially synchronize IDBs between different users reversing the same binaries☆133Updated 8 months ago
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆33Updated 3 years ago
- Go fastcall analysis for ida decompiler☆42Updated 2 months ago
- Easy-to-use IDA plugin for code emulation☆40Updated this week