ohchase / ptrace-doLinks
Featureful library for interacting with unix processes through ptrace, supports x86_64, i686, arm, aarch64 remote function calls
☆46Updated last month
Alternatives and similar repositories for ptrace-do
Users that are interested in ptrace-do are comparing it to the libraries listed below
Sorting:
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆54Updated 2 weeks ago
- Featureful library for iterating and hooking linux and android applications PLT (Procedure Linkage Table) at runtime☆39Updated 3 weeks ago
- tprt ollvm 反混淆 修改 binja il☆47Updated last year
- LLVM pass plugin developed based on LLVM , implemented in Rust, designed for obfuscator-llvm☆46Updated this week
- System Call Hook for ARM64☆171Updated last week
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated last month
- ☆52Updated 2 years ago
- Remote library injection into Android processes, then hooking via various methods☆56Updated last week
- 简单的基于llvm实现vmp保护☆54Updated last week
- GitHub Actions to analyse file using IDA☆31Updated 9 months ago
- with this repo you can bypass libpairipcore tamper and signature protection☆43Updated 4 months ago
- Single-step debugging of native code using frida, stalker, and semaphore☆82Updated 11 months ago
- ☆58Updated 3 years ago
- ☆28Updated 2 months ago
- Android assembly instruction tracing tool☆112Updated 5 months ago
- 自實現Linker的小Demo☆70Updated 3 months ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆53Updated last year
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆32Updated last year
- Code injection on Android without ptrace☆252Updated last year
- 去除BR混淆 Deobfuscation BR☆80Updated last year
- Resume FuncOutline by idapython☆28Updated last year
- Android aarch64 rootkit☆81Updated last week
- 2023 年 羊城杯 ezAndroid dex VMP 恢复工具☆37Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆22Updated last year
- deobfuscation BR☆53Updated last year
- It can help you better use Frida in SO binaries☆35Updated 2 years ago
- Getting better stacks and backtraces in Frida☆53Updated last month
- monitor svc calls of android☆73Updated 7 years ago
- Root takeover via signature spoofing in KernelSU☆18Updated last year
- Find JNI native methods while the app is running.☆21Updated 10 months ago