SherlockElf is a powerful tool designed for both static and dynamic analysis of Android ELF binaries and dynamic iOS Macho-O binaries (experimental).
☆103Feb 17, 2026Updated last week
Alternatives and similar repositories for SherlockElf
Users that are interested in SherlockElf are comparing it to the libraries listed below
Sorting:
- Draw on Canvas based Overlay with RootService☆19Apr 13, 2024Updated last year
- kernel module for modifying device information...☆22Sep 24, 2025Updated 5 months ago
- apatch kpm 模块通用内核读写内存 linux kernel read only support ARM64(based apatch)☆66Jan 13, 2026Updated last month
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆74Oct 22, 2024Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆24Dec 25, 2023Updated 2 years ago
- Trace function calls using lldb☆13Jul 5, 2021Updated 4 years ago
- ☆60Feb 14, 2025Updated last year
- ☆59Aug 30, 2023Updated 2 years ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆152Apr 22, 2024Updated last year
- ☆29Jun 20, 2025Updated 8 months ago
- 劫持Zygote在App启动前注入so☆347Jan 22, 2026Updated last month
- Il2CppDumper for Call of Duty☆34Sep 4, 2024Updated last year
- System Call Hook for ARM64☆212Jan 19, 2026Updated last month
- All-in-one android application protection☆257Feb 12, 2025Updated last year
- Capture input events of any android application☆48Jun 6, 2024Updated last year
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Feb 20, 2026Updated last week
- A header-only C++ library that makes working with the Java Native Interface (JNI) safer and more convenient.☆106Mar 19, 2025Updated 11 months ago
- A Zygisk Module to dump il2cpp/unity games.☆35May 2, 2025Updated 10 months ago
- Remap a library to avoid detection☆132Feb 1, 2024Updated 2 years ago
- linux x86_64 and arm64 syscall hook☆22Dec 9, 2023Updated 2 years ago
- Getting better stacks and backtraces in Frida☆61Feb 20, 2026Updated last week
- Update Frida hooks automatically.☆27Sep 3, 2023Updated 2 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆43Jan 18, 2024Updated 2 years ago
- Customized Frida build for bypassing basic detections and helping ajeossideul (guys) test mobile apps with Frida☆248Feb 9, 2025Updated last year
- 基于内存探测的简易脱壳小工具☆186Mar 27, 2025Updated 11 months ago
- 反ida内联汇编花指令☆54Jul 3, 2023Updated 2 years ago
- GitHub Actions to analyse file using IDA☆35Nov 21, 2024Updated last year
- A library for hiding and retrieving imports in ELF binaries.☆192Apr 18, 2025Updated 10 months ago
- A simple android NativeHook library.☆119May 19, 2025Updated 9 months ago
- Modify Android linker to provide loading module and hook function☆463Oct 13, 2025Updated 4 months ago
- ☆18Jun 12, 2022Updated 3 years ago
- hwBreakpoint Test App☆19Sep 21, 2022Updated 3 years ago
- Android web based memory scanner & editor.☆19Oct 3, 2023Updated 2 years ago
- bypass pairip, bypass google play protect with pairipcore, bypass google play protect with warning dialog,绕过play保护,破解谷歌加固,修复apk,防止闪退,移除谷歌…☆27Jan 2, 2026Updated 2 months ago
- 内核驱动开发工具包 (Kernel Driver Development Kit)☆100Dec 4, 2025Updated 2 months ago
- with this repo you can bypass libpairipcore tamper and signature protection☆55Apr 21, 2025Updated 10 months ago
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆24Nov 24, 2025Updated 3 months ago
- 转换Pxx的vmp文件(check.bin, mw.bin)到.class☆28Mar 15, 2023Updated 2 years ago
- HexRaysPyTools merged! (@NyaMisty @oopsmishap @Tim-Sobolev @OrbitOn-line)☆15Dec 15, 2025Updated 2 months ago