ohchase / yauiLinks
Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64
☆54Updated this week
Alternatives and similar repositories for yaui
Users that are interested in yaui are comparing it to the libraries listed below
Sorting:
- Find JNI native methods while the app is running.☆21Updated 9 months ago
- with this repo you can bypass libpairipcore tamper and signature protection☆41Updated 3 months ago
- Featureful library for interacting with unix processes through ptrace, supports x86_64, i686, arm, aarch64 remote function calls☆43Updated 2 months ago
- Remote library injection into Android processes, then hooking via various methods☆54Updated 2 months ago
- Getting better stacks and backtraces in Frida☆50Updated last month
- NEVER EVER DISABLE SELINUX!!!☆22Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- APatch KernelPatch QEMU Debug Environment☆22Updated 10 months ago
- tprt ollvm 反混淆 修改 binja il☆44Updated 10 months ago
- ☆51Updated last year
- Root takeover via signature spoofing in KernelSU☆17Updated last year
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆21Updated last week
- It can help you better use Frida in SO binaries☆35Updated 2 years ago
- Run `strace` on program that is under another debugger☆17Updated last year
- ☆54Updated 5 months ago
- obpo backend server written by golang☆32Updated 2 years ago
- zygisk插件:用于unity游戏hook☆19Updated 2 years ago
- deobfuscation BR☆51Updated last year
- Obfuscated Binaries☆29Updated 2 years ago
- 使用 frida stalker 实现的 trace☆29Updated 2 years ago
- ☆28Updated last month
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆71Updated 2 years ago
- Single-step debugging of native code using frida, stalker, and semaphore☆80Updated 9 months ago
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆32Updated 4 months ago
- A kernel module for tracing signal☆29Updated 2 years ago
- Android aarch64 rootkit☆32Updated this week
- frida runtime resolves smali☆85Updated 2 months ago
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆27Updated 2 months ago
- 反ida内联汇编花指令☆51Updated 2 years ago
- Update Frida hooks automatically.☆27Updated last year