mustime / AdrillLinks
An Android native libraries injection tool. supports arch arm/arm64/x86/x86_64. Support Android 4.x to 11.0.
☆71Updated 4 years ago
Alternatives and similar repositories for Adrill
Users that are interested in Adrill are comparing it to the libraries listed below
Sorting:
- il2cpp游戏的string类实现char*与std::string的转换和修改☆51Updated 5 years ago
- ☆60Updated 3 years ago
- Android 全平台注入源码☆29Updated 5 years ago
- Android AntiCheat☆47Updated 3 years ago
- Unrealengine4 SDK Generator for Android supports UE4.18 to UE4.22☆38Updated 3 years ago
- Inject so & apk to zygote on android. Support armv8 & armv7.☆61Updated 7 years ago
- Use LD-Preload to Inject a shared library on any android version and architecture☆57Updated 2 years ago
- ☆30Updated 2 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆65Updated last year
- Dedicated library for runtime code patching, injection and some useful memory utilities. works for both Android and Linux☆140Updated 2 months ago
- A kernel module to read and write memory in a remote process.☆63Updated last year
- ☆17Updated 2 years ago
- ☆84Updated 2 years ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆53Updated last year
- 本工具用于解决ollvm编译出来的Linux驱动文件,加载进内核会报错“please compile with -fno-common”的问题☆38Updated 4 years ago
- this is dump Il2Cpp CS Struct and IDA Script without global-metadta.dat in Runtime☆35Updated 3 years ago
- 利用ptrace,通过ptrace修改PC寄存器调用dlopen/dlsym或者在shellcode中调用dlopen/dlsym☆30Updated 6 years ago
- A simple android utility for inject so (suport arm, aarch64)☆28Updated 2 years ago
- About Dump offsets and functions for android games made using Unreal Engine☆44Updated 2 years ago
- Capture input events of any android application☆48Updated last year
- 基于Linux内核,一款C++安卓内存插件,用于应用进程的内存修改工具☆93Updated 5 years ago
- 一个用于在安卓平台上进行主动调用来dump unity手游的so模块。☆79Updated 7 months ago
- Toolkit for precise Android/Linux process memory control, enabling reading, writing, module handling, and dynamic code manipulation.☆96Updated 2 years ago
- Android Anti Root Detection☆23Updated 3 years ago
- 使用frida spawn启动目标il2cpp手游注入脚本获得需要的il2cpp api的所在偏移☆112Updated last year
- hook surfaceflinger进程的eglSwapBuffers方式实现绘制,适用arm64 root下的安卓真机☆35Updated 3 years ago
- ☆17Updated 2 years ago
- Android Ptrace Injector☆251Updated last year
- Android Memory Access at Runtime: Reading and Writing Using Memory Files and Maps☆73Updated 2 years ago
- Dump Memory Segment From Process Memory and Rebuild ELF So Binaries☆30Updated 4 years ago