hackcatml / frida-findJNINativeMethodsLinks
Find JNI native methods while the app is running.
☆20Updated last year
Alternatives and similar repositories for frida-findJNINativeMethods
Users that are interested in frida-findJNINativeMethods are comparing it to the libraries listed below
Sorting:
- Single-step debugging of native code using frida, stalker, and semaphore☆82Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆23Updated last year
- GitHub Actions to analyse file using IDA☆33Updated 11 months ago
- with this repo you can bypass libpairipcore tamper and signature protection☆45Updated 6 months ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆64Updated 11 months ago
- A zygisk module that dumps so file from process memory☆90Updated last year
- It can help you better use Frida in SO binaries☆34Updated 2 years ago
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆35Updated 8 months ago
- ☆58Updated 9 months ago
- tprt ollvm 反混淆 修改 binja il☆48Updated last year
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆56Updated 2 weeks ago
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 3 months ago
- frida runtime resolves smali☆89Updated 6 months ago
- 使用 frida stalker 实现的 trace☆29Updated 2 years ago
- 一个用于抹去ptrace注入部分文件特征的apatch内核模块☆52Updated 3 weeks ago
- Getting better stacks and backtraces in Frida☆57Updated 3 months ago
- ☆31Updated 3 weeks ago
- deobfuscation BR☆52Updated last year
- A rootkit for Android.☆54Updated last year
- zygisk插件:用于unity游戏hook☆19Updated 2 years ago
- Android assembly instruction tracing tool☆124Updated 6 months ago
- APatch KernelPatch QEMU Debug Environment☆20Updated last year
- 去除BR混淆 Deobfuscation BR☆84Updated last year
- 研究内核改机策略☆65Updated last year
- ☆27Updated 4 months ago
- deobf tx libtprt's obfuscation☆51Updated last year
- Allows you to emulate Android native libraries, based on MicroDbg☆20Updated 9 months ago
- frida打印java调用栈的详细信息☆38Updated 9 months ago
- 对目标函数进行trace 只适用于 arm64☆108Updated 2 months ago
- ☆34Updated 10 months ago