ohchase / plt-rsLinks
Featureful library for iterating and manipulating linux and android application's PLT (Procedure Linkage Table) at runtime
☆36Updated last month
Alternatives and similar repositories for plt-rs
Users that are interested in plt-rs are comparing it to the libraries listed below
Sorting:
- Featureful library for interacting with unix processes through ptrace, supports x86_64, i686, arm, aarch64 remote function calls☆49Updated 3 months ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆56Updated 3 weeks ago
- ☆35Updated 4 months ago
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 3 months ago
- Run `strace` on program that is under another debugger☆18Updated 2 years ago
- Remote library injection into Android processes, then hooking via various methods☆61Updated last month
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆32Updated last year
- Bypass dynamic linking function restriction on Android by forging caller address☆40Updated 3 years ago
- Update Frida hooks automatically.☆27Updated 2 years ago
- A comprehensive plug-in injection toolset☆38Updated 4 months ago
- It can help you better use Frida in SO binaries☆34Updated 2 years ago
- APatch KernelPatch QEMU Debug Environment☆20Updated last year
- Custom linker implemented with Segmentation Fault handler☆21Updated 6 years ago
- PoC app for linjector-rs☆19Updated last year
- A frida module to parse Elf headers in runtime☆36Updated 6 years ago
- A kernel module for tracing signal☆30Updated 2 years ago
- A Simple uprobe Hook Framework☆63Updated 7 months ago
- Root takeover via signature spoofing in KernelSU☆19Updated 2 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆82Updated last year
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆73Updated 2 years ago
- deobf tx libtprt's obfuscation☆51Updated last year
- ☆11Updated 8 months ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆22Updated last year
- Android eBPF sample☆50Updated 3 years ago
- monitor svc calls of android☆72Updated 7 years ago
- ☆32Updated 3 years ago
- tprt ollvm 反混淆 修改 binja il☆48Updated last year
- Magisk Module with strace☆35Updated 5 years ago
- Find JNI native methods while the app is running.☆20Updated last year
- A c++ (jni) implementation of KeyAttestation for Android☆29Updated last year