gmh5225 / AndroidDriveSignity
AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loading of custom drivers
☆62Updated 11 months ago
Alternatives and similar repositories for AndroidDriveSignity:
Users that are interested in AndroidDriveSignity are comparing it to the libraries listed below
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆34Updated 9 months ago
- Implementation of sllvm obfuscator☆66Updated 2 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆50Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆87Updated last year
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- Injecting into SELinux-protected system service processes under root on Android.☆38Updated 11 months ago
- Frida's setHardwareWatchpoint tutorial☆26Updated 4 months ago
- Getting better stacks and backtraces in Frida☆35Updated 8 months ago
- A zygisk module that dumps so file from process memory☆47Updated 4 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆66Updated last year
- App for learnfrida.info☆20Updated 2 years ago
- ☆59Updated 5 months ago
- Android Overlay Hijack☆21Updated 5 months ago
- ☆50Updated last year
- Kernel Read Write Execute☆84Updated 5 months ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆127Updated 9 months ago
- Some Of Anti-Frida Stuff☆116Updated 2 years ago
- Inject shared libraries into processes on Android (real/emulator device supported)☆95Updated 9 months ago
- Dynamic injection tool for Linux/Android☆92Updated last month
- system call hooking on arm64 linux via a variety of methods☆47Updated 2 years ago
- ☆18Updated 4 months ago
- An x86-64 code virtualizer for VM based obfuscation☆104Updated 2 months ago
- Stealth patch for Frida, stealth knowledge collection☆61Updated 6 months ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆55Updated 10 months ago
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆89Updated last year
- ☆15Updated last year
- Toolset which makes possible hiddenly inject code in apps through system libraries☆29Updated 3 weeks ago
- LPE exploit for CVE-2024-0582 (io_uring)☆98Updated 10 months ago
- Utilities scripts and Python module to facilitate executing idapython scripts in IDA.☆23Updated last week