michalbednarski / side-straceView external linksLinks
Run `strace` on program that is under another debugger
☆18Aug 6, 2023Updated 2 years ago
Alternatives and similar repositories for side-strace
Users that are interested in side-strace are comparing it to the libraries listed below
Sorting:
- 利用angr去除ollvm的虚假控制流☆14Mar 20, 2021Updated 4 years ago
- ☆14Nov 9, 2022Updated 3 years ago
- frida runtime resolves smali☆92Jan 24, 2026Updated 3 weeks ago
- Android Emulator with Newest Security Patch☆28Mar 4, 2025Updated 11 months ago
- It can help you better use Frida in SO binaries☆35Feb 22, 2023Updated 2 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆31Apr 16, 2022Updated 3 years ago
- ☆85Sep 19, 2024Updated last year
- 反ida内联汇编花指令☆54Jul 3, 2023Updated 2 years ago
- 基于 frida 可监控 native 方法调用☆69Jun 16, 2023Updated 2 years ago
- NEVER EVER DISABLE SELINUX!!!☆25Jan 30, 2024Updated 2 years ago
- ☆32Sep 13, 2024Updated last year
- deflat plugins for ida pro☆45Aug 25, 2023Updated 2 years ago
- 自實現Linker的小Demo☆76Jun 5, 2025Updated 8 months ago
- 研究内核改机策略☆69Mar 13, 2024Updated last year
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆99Jan 21, 2024Updated 2 years ago
- A library for hiding and retrieving imports in ELF binaries.☆190Apr 18, 2025Updated 9 months ago
- 计算内存中的libc.so,libart.so 的crc与文件中的对比检测apk是否处于异常环境。☆82Dec 13, 2022Updated 3 years ago
- A tool that traces system calls using eBPF☆268Oct 31, 2024Updated last year
- Gnirehtet provides reverse tethering for Android☆13Jan 5, 2022Updated 4 years ago
- ☆14Feb 6, 2025Updated last year
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆59May 20, 2024Updated last year
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆17Nov 26, 2019Updated 6 years ago
- ☆59Aug 30, 2023Updated 2 years ago
- DxFx is a proof-of-concept DJI Pilot unpacker☆40Feb 1, 2024Updated 2 years ago
- Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.☆31Oct 14, 2024Updated last year
- ☆53Jul 11, 2023Updated 2 years ago
- android jni trace for arm64 for magisk module!☆90Nov 28, 2025Updated 2 months ago
- 允许您全局修改传感器的值,无需注入特定app以防被检测☆64May 28, 2025Updated 8 months ago
- 对目标函数进行trace 只适用于 arm64☆167Aug 30, 2025Updated 5 months ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆156Jul 11, 2024Updated last year
- Android Root Zap Framework, Lazy and Powerful :)☆55Jul 28, 2025Updated 6 months ago
- MagiskHide in Zygisk☆87Aug 1, 2022Updated 3 years ago
- Generic Frida Script To Bypass Root Detection☆56Sep 25, 2022Updated 3 years ago
- Decode protobuf without proto definition☆39Jul 10, 2025Updated 7 months ago
- obpo backend server written by golang☆33Jul 28, 2023Updated 2 years ago
- See https://gitlab.com/pandasauce/qsee-ta-tool for an up-to-date version☆13May 18, 2018Updated 7 years ago
- FunJni(JNITrace & hook ,So分析神器 )☆133Sep 17, 2023Updated 2 years ago
- Instruction tracer powered by Frida☆153Jun 9, 2025Updated 8 months ago
- 关 于Magisk生态的研究☆160Apr 29, 2024Updated last year