linux-on-android / patchelf
patchelf for android
☆16Updated 8 years ago
Alternatives and similar repositories for patchelf:
Users that are interested in patchelf are comparing it to the libraries listed below
- read process memory with process_vm_readv☆16Updated 5 years ago
- A frida module to parse Elf headers in runtime☆34Updated 5 years ago
- rewrite dex file☆41Updated 3 years ago
- Android Injector☆23Updated 8 years ago
- Start method tracing using Android's internal APIs☆12Updated 7 years ago
- android arm64(aarch64) code inject☆39Updated 9 years ago
- ☆31Updated 3 years ago
- unpack UPX on android.☆35Updated 5 years ago
- get android app signature without java api☆33Updated 6 years ago
- ☆21Updated 5 years ago
- Android-Syscall-Logger☆22Updated 4 years ago
- 1337C001's Memory Dumper☆29Updated 5 years ago
- substrate framework for android based on frida☆16Updated 4 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆31Updated 9 months ago
- IDA plugin aid to set android so breakpoint☆32Updated 7 years ago
- Update Frida hooks automatically.☆27Updated last year
- ☆17Updated 10 months ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆19Updated 5 years ago
- simple dex string deobfuscator☆12Updated 4 years ago
- This will help u inject a so file or dex file to zygote,and zygote still run normally.☆22Updated 9 years ago
- JNI Helper for IDA 7.4+☆41Updated 8 months ago
- A runtime patching library for Android.☆20Updated 8 years ago
- Hook native with xposed☆17Updated 3 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆28Updated 5 years ago
- An Xposed plugin loader without rebooting the phone☆3Updated 3 years ago
- android arm64(aarch64) code inject☆15Updated 9 years ago
- elf 函数加密,字符串加密☆48Updated 8 years ago
- jeb Decrypt python script☆19Updated 5 years ago
- Simple Android ARM&ARM64 GOT Hook☆36Updated 2 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year