hackcatml / frida-watchpoint-tutorialLinks
Frida's setHardwareWatchpoint tutorial
☆59Updated last year
Alternatives and similar repositories for frida-watchpoint-tutorial
Users that are interested in frida-watchpoint-tutorial are comparing it to the libraries listed below
Sorting:
- Getting better stacks and backtraces in Frida☆53Updated 2 months ago
- ☆53Updated 2 years ago
- ☆41Updated 3 months ago
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆86Updated 6 months ago
- 去除BR混淆 Deobfuscation BR☆80Updated last year
- tprt ollvm 反混淆 修改 binja il☆47Updated last year
- deobfuscation BR☆52Updated last year
- GitHub Actions to analyse file using IDA☆30Updated 11 months ago
- 使用 frida stalker 实现的 trace☆29Updated 2 years ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆146Updated last year
- deobf tx libtprt's obfuscation☆49Updated last year
- ☆57Updated 8 months ago
- Injecting into SELinux-protected system service processes under root on Android.☆46Updated last year
- deflat plugins for ida pro☆41Updated 2 years ago
- Traces syscalls on iOS via Frida, including Mach syscalls.☆80Updated last week
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆39Updated last year
- Mobile app memory view & edit PyQt6 program☆70Updated 5 months ago
- IDA plugin which queries Local language models to speed up reverse-engineering☆23Updated last year
- Taint Analysis Engine and Trace Exploration : Overcome Obfuscation☆45Updated last week
- 反ida内联汇编花指令☆53Updated 2 years ago
- System Call Hook for ARM64☆175Updated last week
- Find JNI native methods while the app is running.☆20Updated 11 months ago
- A zygisk module that dumps so file from process memory☆90Updated last year
- Single-step debugging of native code using frida, stalker, and semaphore☆82Updated last year
- Deobfuscate OLLVM Bogus Control Flow via angr☆65Updated 3 years ago
- Small Apps As PoC to Detect Frida With Frida☆53Updated 3 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆31Updated last year
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆55Updated last week
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆23Updated last year
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆35Updated 3 years ago