niqiuqiux / PointerScanLinks
C++的内存指针链扫描
☆29Updated 3 weeks ago
Alternatives and similar repositories for PointerScan
Users that are interested in PointerScan are comparing it to the libraries listed below
Sorting:
- A Kernel module to break the kernel read-only to modify the syscall_table purpose (only in the Linux Arm64 6.6 Kernel test runs properly)…☆41Updated last year
- ☆60Updated 3 years ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆59Updated last year
- Draw on Canvas based Overlay with RootService☆19Updated last year
- Android aarch64 kernel driver module providing efficient memory operations, touch simulation and IPC. Features include fast memory remapp…☆98Updated 5 months ago
- ☆34Updated last year
- ☆23Updated last year
- Inotify监听测试☆35Updated 3 years ago
- 内核驱动开发工具包 (Kernel Driver Development Kit)☆95Updated 2 months ago
- A kernel module to read and write memory in a remote process.☆73Updated last year
- Capture input events of any android application☆48Updated last year
- Android Mem☆61Updated last month
- Android aarch64 kernel rootkit(driver module)☆131Updated 2 months ago
- My own tools for developing kernel modules☆15Updated 4 months ago
- 自實現Linker的小Demo☆76Updated 8 months ago
- 这是一个框架,通过纯CPU生成帧缓冲绘制,绕过游戏GPU渲染检测☆35Updated 5 months ago
- ☆18Updated 4 years ago
- ☆18Updated last year
- ☆39Updated last year
- apatch内核模块用于隐藏mountxxx & maps & smaps的指定内容☆65Updated 11 months ago
- 以C++编写的安卓进程内存修改工具☆16Updated last month
- apatch内核模块 用于文件重定向☆74Updated 10 months ago
- this is Android Custom Linker by Android12 LinkerSourcesCode☆45Updated last year
- with this repo you can bypass libpairipcore tamper and signature protection☆53Updated 9 months ago
- 🚀 Empower Your Android Native Apps: Seamlessly Dispatch Input Events to Custom Surfaces! Unlock the power of system-level touch and inpu…☆41Updated 5 months ago
- A rootkit for Android.☆63Updated last year
- linux x86_64 and arm64 syscall hook☆22Updated 2 years ago
- ☆17Updated 2 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆66Updated last year
- ☆28Updated last year