onesss19 / Syscall_intercept_arm64
☆110Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Syscall_intercept_arm64
- 一个基于ptrace-seccomp简单的重定向openat的demo☆61Updated last year
- ☆111Updated 2 years ago
- 安卓绕过ptrace反调试☆67Updated 3 years ago
- Seccomp + Signal Intercept SVC☆88Updated last year
- monitor svc calls of android☆72Updated 6 years ago
- ☆39Updated last year
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆97Updated 4 months ago
- 研究内核改机策略☆48Updated 8 months ago
- 用于练手的环境检测的demo☆69Updated 10 months ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆140Updated 5 months ago
- ☆55Updated last year
- 自實現Linker的小Demo☆53Updated 4 months ago
- smali trace☆145Updated 2 years ago
- ☆40Updated 5 months ago
- this is frida trace assemble and register change tools☆147Updated last year
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆94Updated 9 months ago
- IDA Python Script for anti ollvm☆98Updated 3 years ago
- 个人专用 ONEPLUS 5 内核,做了一些基础的反调试修改(从 maps 隐藏特定 lib,最完整最正常的 tracerPid 修改措施)☆78Updated 3 years ago
- libEncryptor vm 还原的分享☆52Updated last month
- ☆107Updated 3 years ago
- Automatically de-obfuscate ollvm and generate binaries☆101Updated 2 years ago
- frida dump android elf, support spawn and attach mode☆66Updated 7 months ago
- 关于Magisk生态的研究☆115Updated 6 months ago
- Android system call hook☆120Updated 2 months ago
- 绕过bilibili apk的反frida机制☆76Updated 6 months ago
- 移植Youpk到Pixel2XL上☆85Updated 2 years ago
- This is a tool used to inject so to any app by ptrace.☆67Updated last year
- Dynamic java method hook for Android,Implemented by jvmti☆9Updated 9 months ago