ikoz / jdwp-lib-injector
☆73Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for jdwp-lib-injector
- Android library for detecting Android virtual containers.☆67Updated 3 years ago
- Android app for demonstrating native library harnessing☆41Updated 5 years ago
- JNI Helper Plugin☆52Updated 3 years ago
- ☆32Updated 5 years ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- Android detect debugger☆103Updated 7 years ago
- ☆53Updated 6 years ago
- GOT Hook implemented in Android☆73Updated 7 years ago
- Android Injector☆23Updated 7 years ago
- AndroidSubstrate_hookingC_examples☆55Updated 9 years ago
- Android Library Code Recognition☆78Updated 6 months ago
- ☆58Updated 7 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- Android rootkit☆40Updated 8 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆45Updated 7 years ago
- ☆32Updated 10 months ago
- ElfHooK, reference with boyliang's AllHookInOne project, fix bugs, support android 5/6/7 and aarch64☆29Updated 2 years ago
- ☆31Updated 8 years ago
- android arm64(aarch64) code inject☆38Updated 9 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆89Updated 6 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆39Updated 6 years ago
- use frida monitoring android app☆49Updated 6 years ago
- Automated Frida hook generation with JEB☆141Updated last year
- PoC Frida script to view Android libbinder traffic☆132Updated 3 months ago
- ART tracing research☆88Updated last year
- ☆39Updated 7 years ago
- Some frida scripts☆141Updated 6 years ago
- LD_PRELOAD magic for Android's AssetManager☆78Updated 2 years ago
- Lazenca A - Android Memory Cheat Tool(Engine)☆32Updated 6 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆117Updated 9 years ago