ne2der / ASyScallHookFrameLinks
Syscall table hook frame in Android kernel for arm and arm64
☆83Updated 8 years ago
Alternatives and similar repositories for ASyScallHookFrame
Users that are interested in ASyScallHookFrame are comparing it to the libraries listed below
Sorting:
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆90Updated 7 years ago
- ☆60Updated 8 years ago
- ☆88Updated 4 years ago
- Shared Library Injector on Android☆151Updated 5 years ago
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆169Updated 3 years ago
- deobfuse compiler☆214Updated 4 years ago
- Some reverse-engineering scripts☆115Updated 6 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆162Updated 5 years ago
- deobfuscator llvm arm64 script☆95Updated 5 years ago
- ☆59Updated last year
- android arm64(aarch64) code inject☆41Updated 10 years ago
- read process memory with process_vm_readv☆16Updated 5 years ago
- 逆向聚安全litevm相关☆52Updated 5 years ago
- Instructions tracing powered by frida☆178Updated 6 years ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago
- anti ollvm like flat/bcf/sub☆73Updated 5 years ago
- Materials for LIEF tutorials☆152Updated 2 years ago
- Emulator Native Hooking Framework based on Xposed☆51Updated 7 years ago
- ☆54Updated 7 years ago
- Like-LeGu☆32Updated last year
- unpack UPX on android.☆35Updated 6 years ago
- break ollvm.☆104Updated 3 months ago
- Android rootkit☆43Updated 9 years ago
- ART tracing research☆91Updated 2 years ago
- rewrite dex file☆42Updated 3 years ago
- android arm64(aarch64) code inject☆15Updated 10 years ago
- Android detect debugger☆104Updated 8 years ago
- deobfuscation ollvm's fla☆67Updated 7 years ago
- A frida module to parse Elf headers in runtime☆35Updated 6 years ago