jhector / armhook-core
Core of Linux hooking engine for ARM architecture
☆22Updated 7 years ago
Alternatives and similar repositories for armhook-core
Users that are interested in armhook-core are comparing it to the libraries listed below
Sorting:
- A dynamic information flow tracing system for Android☆54Updated 4 years ago
- Linux hooking engine for ARM architecture☆16Updated 10 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- ☆27Updated 9 years ago
- ELF obfuscator☆67Updated 9 years ago
- ☆31Updated 9 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 9 years ago
- ☆27Updated 8 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Updated 7 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 9 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- CVE-2015-3636 exploit☆44Updated 9 years ago
- some idapython scripts for android debugging.☆44Updated 7 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- ☆25Updated 6 years ago
- ☆42Updated 8 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- ☆23Updated 10 years ago
- ☆38Updated 8 years ago
- Original code about binary encryption from phrack☆71Updated 13 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- ☆33Updated 9 years ago
- IDA PDB Loader☆47Updated 6 years ago
- ☆23Updated 10 years ago
- ☆73Updated 9 years ago
- Automatically exported from code.google.com/p/mynav☆29Updated 10 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆28Updated 11 years ago
- Get symbol address and name from tables for kallsyms☆31Updated 9 years ago