ohchase / plt-rsLinks
Featureful library for iterating and manipulating linux and android application's PLT (Procedure Linkage Table) at runtime
☆36Updated 3 weeks ago
Alternatives and similar repositories for plt-rs
Users that are interested in plt-rs are comparing it to the libraries listed below
Sorting:
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆55Updated this week
- Featureful library for interacting with unix processes through ptrace, supports x86_64, i686, arm, aarch64 remote function calls☆49Updated 2 months ago
- ☆35Updated 4 months ago
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 3 months ago
- Remote library injection into Android processes, then hooking via various methods☆61Updated last month
- Run `strace` on program that is under another debugger☆18Updated 2 years ago
- It can help you better use Frida in SO binaries☆34Updated 2 years ago
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆70Updated last year
- APatch KernelPatch QEMU Debug Environment☆20Updated last year
- Trace Android framework API, native libraries, system calls and other events using eBPF☆151Updated last year
- Single-step debugging of native code using frida, stalker, and semaphore☆81Updated last year
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆31Updated last year
- Find JNI native methods while the app is running.☆20Updated last year
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆70Updated 2 years ago
- tprt ollvm 反混淆 修改 binja il☆47Updated last year
- A frida module to parse Elf headers in runtime☆36Updated 6 years ago
- Custom linker implemented with Segmentation Fault handler☆20Updated 5 years ago
- try try full features ebpf on android without Pixel 6☆20Updated 3 years ago
- A Simple uprobe Hook Framework☆60Updated 7 months ago
- Bypass dynamic linking function restriction on Android by forging caller address☆40Updated 3 years ago
- Trace jni calls with eBPF on Android☆24Updated 3 years ago
- monitor svc calls of android☆72Updated 7 years ago
- Android eBPF sample☆50Updated 3 years ago
- A comprehensive plug-in injection toolset☆37Updated 4 months ago
- ☆32Updated 3 years ago
- Android-Syscall-Logger☆21Updated 4 years ago
- Update Frida hooks automatically.☆27Updated 2 years ago
- search all symbal in ELF file(dlsym can not find)☆35Updated 6 years ago
- Magisk Module with strace☆34Updated 4 years ago
- deobfuscation BR☆52Updated last year