gmh5225 / AndroidDriveSignityLinks
AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loading of custom drivers
☆65Updated last year
Alternatives and similar repositories for AndroidDriveSignity
Users that are interested in AndroidDriveSignity are comparing it to the libraries listed below
Sorting:
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆41Updated last year
- Implementation of sllvm obfuscator☆66Updated 3 years ago
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆106Updated 4 years ago
- Easy-to-use Android library for tampering detection, with a sample app included☆62Updated 10 months ago
- Injecting into SELinux-protected system service processes under root on Android.☆50Updated last year
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆90Updated 9 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆110Updated last year
- binary instrumentation, analysis, and patching framework☆100Updated last week
- Frida's setHardwareWatchpoint tutorial☆63Updated last year
- Binary Ninja plugin to analyze and simplify obfuscated code☆236Updated 3 months ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆38Updated 2 years ago
- Getting better stacks and backtraces in Frida☆58Updated 2 months ago
- Zyrox: LLVM based, compile-time obfuscator plugin.☆84Updated last month
- llvm powered deobfuscation of a vm-based protection☆46Updated 9 months ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆152Updated last year
- ELF static analysis and injection framework that parse, manipulate, patch and camouflage ELF files.☆144Updated last week
- breaking decompilers☆56Updated 8 months ago
- ☆20Updated last year
- Kernel mode to user mode so injection☆91Updated 5 years ago
- LLVM based obfuscation engine☆109Updated 7 months ago
- A collection of Proof-of-Concept implementations of various anti-disassembly techniques for ARM32 and ARM64 architectures.☆74Updated 9 months ago
- system call hooking on arm64 linux via a variety of methods☆49Updated 3 years ago
- An IDA Pro plugin that display cross-references to functions or variables across the entire binary in Hex-Rays pseudocode☆125Updated last week
- Tools to bypass flawed SELinux policies using the init_module system call☆57Updated 2 years ago
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆237Updated 9 months ago
- Have you ever wondered: what if IDA had great Ctrl+F search support for Pseudocode windows? No longer!☆72Updated 3 weeks ago
- Assisting Go Analysis and Reversing☆96Updated 2 months ago
- Go fastcall analysis for ida decompiler☆45Updated 7 months ago
- Disassembler for Zeus VM custom instruction set☆30Updated last year
- Utilities scripts and Python module to facilitate executing idapython scripts in IDA.☆30Updated 2 months ago