maiyao1988 / elf-dump-fix
Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding
☆444Updated 4 years ago
Alternatives and similar repositories for elf-dump-fix:
Users that are interested in elf-dump-fix are comparing it to the libraries listed below
- Dump Memory of Process in Android☆283Updated 3 years ago
- ☆817Updated 3 years ago
- 通过内存特征检测frida☆479Updated 5 years ago
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆584Updated 10 months ago
- 利用 frida 获取 Jni RegisterNatives 动态注册的函数☆325Updated 2 years ago
- ☆324Updated 10 months ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆582Updated last month
- Is a protect Android App anti any attacks and environments.☆334Updated last year
- 一个小脚本,用于trace so中native函数的调用。☆524Updated 3 years ago
- Allows you to partly emulate an Android native library.☆359Updated 4 years ago
- An OLLVM-CFF Deobfuscation Plugin☆607Updated last year
- Android 加固应用Hook方式-Frida☆280Updated 2 years ago
- Jnitrace for cpp☆268Updated 11 months ago
- ☆337Updated 2 years ago
- An improved version of AndroidNativeEmu,Allow running android elf on PC☆675Updated last year
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆231Updated 2 years ago
- Script to quickly hook natives call to JNI in Android☆558Updated last year
- Modify Android linker to provide loading module and hook function☆416Updated last week
- 整理一些unidbg常用的工具在这里☆334Updated 3 years ago
- android memory access trace utility powered by frida framework☆235Updated 2 years ago
- Android内联hook框架☆326Updated 5 years ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆229Updated 4 years ago
- 一个IDA脚本,可以检测出哈希算法(无论是否魔改常数)并生成frida hook 代码。☆409Updated 3 years ago
- ☆238Updated 3 years ago
- IDA Frida Plugin for tracing something interesting.☆281Updated last week
- Inject frida agents on local processes through an Android app☆266Updated 3 years ago
- 梆梆企业加固详细逆向分析过程, 包含两种对该加固的脱壳机(直接解密classes0.jar和基于frida hook)☆429Updated 5 years ago
- Engine used by jnitrace to intercept JNI API calls.☆316Updated last year
- strongR-frida☆200Updated 3 years ago
- 基于eBPF的syscall追踪工具,适用于安卓平台☆318Updated last year