hackcatml / frida-watchpoint-tutorialLinks
Frida's setHardwareWatchpoint tutorial
☆52Updated 9 months ago
Alternatives and similar repositories for frida-watchpoint-tutorial
Users that are interested in frida-watchpoint-tutorial are comparing it to the libraries listed below
Sorting:
- Getting better stacks and backtraces in Frida☆49Updated last month
- tprt ollvm 反混淆 修改 binja il☆43Updated 10 months ago
- 去除BR混淆 Deobfuscation BR☆76Updated last year
- Find JNI native methods while the app is running.☆21Updated 8 months ago
- Mobile app memory view & edit PyQt6 program☆64Updated 2 months ago
- deobfuscation BR☆49Updated last year
- ☆51Updated last year
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆31Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- deflat plugins for ida pro☆40Updated last year
- 反ida内联汇编花指令☆51Updated 2 years ago
- ☆54Updated 4 months ago
- GitHub Actions to analyse file using IDA☆30Updated 7 months ago
- An IDA Pro plugin to allow use of Python venvs☆16Updated 9 months ago
- 使用 frida stalker 实现的 trace☆28Updated 2 years ago
- Obfuscated Binaries☆29Updated 2 years ago
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆38Updated last year
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆68Updated 8 months ago
- IDA plugin which queries Local language models to speed up reverse-engineering☆23Updated last year
- System Call Hook for ARM64☆159Updated 3 weeks ago
- Help us reverse ios more easily☆14Updated last month
- A simple android utility for inject so (suport arm, aarch64)☆28Updated 2 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆53Updated 3 weeks ago
- Traces syscalls on iOS via Frida, including Mach syscalls☆76Updated last year
- ☆31Updated 3 years ago
- A zygisk module that dumps so file from process memory☆77Updated 9 months ago
- A WIP Obfuscator based on llvm14☆33Updated 2 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆79Updated 9 months ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆132Updated last year
- A rootkit for Android.☆54Updated last year