itewqq / android-kernel-playLinks
A note on basic android kernel development.
☆17Updated 9 months ago
Alternatives and similar repositories for android-kernel-play
Users that are interested in android-kernel-play are comparing it to the libraries listed below
Sorting:
- Loadable Kernel Module for Android☆75Updated 5 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆53Updated last week
- ☆51Updated last year
- Run `strace` on program that is under another debugger☆17Updated last year
- with this repo you can bypass libpairipcore tamper and signature protection☆41Updated 2 months ago
- ☆28Updated 3 weeks ago
- ☆72Updated 9 months ago
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆27Updated last month
- CVE-2025-21479 proof-of-concept, I think☆71Updated this week
- Magisk Module with strace☆33Updated 4 years ago
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆31Updated 2 months ago
- A demo app to detect Zygote injections☆88Updated 3 months ago
- APatch KernelPatch QEMU Debug Environment☆22Updated 10 months ago
- LSPosed module to prevent Santander UK app from detecting Zygisk implementations☆28Updated last month
- Android kernel exploitation for CVE-2022-20409☆190Updated 9 months ago
- ☆35Updated 6 months ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆103Updated last year
- Android Overlay Hijack☆25Updated 10 months ago
- ☆66Updated last year
- A POC to detect zygisk☆45Updated last month
- ☆54Updated 5 months ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆52Updated last year
- Code injection on Android without ptrace☆246Updated last year
- Root takeover via signature spoofing in KernelSU☆17Updated last year
- A header-only C++ library that makes working with the Java Native Interface (JNI) safer and more convenient.☆75Updated 3 months ago
- ☆31Updated 3 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- An Android Injector aimed to inject through Virtual Space without root permissions☆151Updated 5 months ago
- NEVER EVER DISABLE SELINUX!!!☆22Updated last year
- Android Root Zap Framework, Lazy and Powerful :)☆52Updated 2 years ago