ohchase / ptrace-doLinks
Featureful library for interacting with unix processes through ptrace, supports x86_64, i686, arm, aarch64 remote function calls
☆51Updated 2 weeks ago
Alternatives and similar repositories for ptrace-do
Users that are interested in ptrace-do are comparing it to the libraries listed below
Sorting:
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆59Updated last week
- GitHub Actions to analyse file using IDA☆35Updated last year
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 4 months ago
- tprt ollvm 反混淆 修改 binja il☆49Updated last year
- System Call Hook for ARM64☆193Updated last month
- Remote library injection into Android processes, then hooking via various methods☆63Updated 2 weeks ago
- 自實現Linker的小Demo☆75Updated 6 months ago
- ☆59Updated 3 years ago
- Featureful library for iterating and manipulating linux and android application's PLT (Procedure Linkage Table) at runtime☆37Updated last week
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆73Updated last year
- A rootkit for Android.☆58Updated last year
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆53Updated last year
- LLVM pass plugin developed based on LLVM , implemented in Rust, designed for obfuscator-llvm☆67Updated 2 months ago
- with this repo you can bypass libpairipcore tamper and signature protection☆44Updated 7 months ago
- 基于 Unicorn 引擎的轻量级 ARM64 动态追踪模拟工具。支持 IDA Pro、生 成 Tenet 日志、本地代码模拟、内存转储、寄存器状态追踪和指令级日志记录。☆148Updated 2 weeks ago
- Inotify监听测试☆35Updated 3 years ago
- Android AntiCheat☆47Updated 3 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆64Updated last year
- A kernel module to read and write memory in a remote process.☆63Updated last year
- Android assembly instruction tracing tool☆129Updated 7 months ago
- It can help you better use Frida in SO binaries☆35Updated 2 years ago
- ☆29Updated 5 months ago
- Single-step debugging of native code using frida, stalker, and semaphore☆84Updated last year
- 去除BR混淆 Deobfuscation BR☆88Updated last year
- A kernel module for tracing signal☆31Updated 2 years ago
- Find JNI native methods while the app is running.☆22Updated last year
- ☆12Updated 9 months ago
- llvm with customised obfuscation optimisations☆15Updated last year
- hwBreakpoint Test App☆19Updated 3 years ago
- 使用 frida stalker 实现的 trace☆29Updated 3 years ago