mustime / AdrillLinks
An Android native libraries injection tool. supports arch arm/arm64/x86/x86_64. Support Android 4.x to 11.0.
☆71Updated 3 years ago
Alternatives and similar repositories for Adrill
Users that are interested in Adrill are comparing it to the libraries listed below
Sorting:
- ☆58Updated 3 years ago
- Android AntiCheat☆45Updated 3 years ago
- Unrealengine4 SDK Generator for Android supports UE4.18 to UE4.22☆36Updated 3 years ago
- Android 全平台注入源码☆29Updated 5 years ago
- il2cpp游戏的string类实现char*与std::string的转换和修改☆49Updated 5 years ago
- Inject so & apk to zygote on android. Support armv8 & armv7.☆63Updated 6 years ago
- ☆30Updated last year
- A kernel module to read and write memory in a remote process.☆63Updated 11 months ago
- 本工具用于解决ollvm编译出来的Linux驱动文件,加载进内核会报错“please compile with -fno-common”的问题☆37Updated 4 years ago
- Dedicated library for runtime code patching, injection and some useful memory utilities. works for both Android and Linux☆123Updated this week
- 利用ptrace,通过ptrace修改PC寄存器调用dlopen/dlsym或者在shellcode中调用dlopen/dlsym☆29Updated 6 years ago
- hook surfaceflinger进程的eglSwapBuffers方式实现绘制,适用arm64 root下的安卓真机☆34Updated 3 years ago
- UE4 dump frida script☆168Updated 10 months ago
- ☆82Updated last year
- 安卓内存读写驱动 linux kernel (Android) memory tool☆160Updated last year
- Use LD-Preload to Inject a shared library on any android version and architecture☆55Updated last year
- How to Cheat Android Games And How to Anti-Cheat☆82Updated 2 years ago
- SDK Dumps of PUBG-Mobile☆18Updated last year
- Android Ptrace Injector☆229Updated last year
- 使用frida spawn启动目标il2cpp手游注入脚本获得需要的il2cpp api的所在偏移☆107Updated last year
- ☆18Updated 2 years ago
- Toolkit for precise Android/Linux process memory control, enabling reading, writing, module handling, and dynamic code manipulation.☆93Updated last year
- About Dump offsets and functions for android games made using Unreal Engine☆39Updated 2 years ago
- Inject a shared library into a process using ptrace☆238Updated last year
- 基于Linux内核,一款C++安卓内存插件,用于应用进程的内存修改工具☆92Updated 5 years ago
- ☆47Updated 2 years ago
- Android Memory Access at Runtime: Reading and Writing Using Memory Files and Maps☆71Updated last year
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆52Updated last year
- Capture input events of any android application☆48Updated last year
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆62Updated 8 months ago