rednaga / frida-stack
Getting better stacks and backtraces in Frida
☆36Updated 9 months ago
Alternatives and similar repositories for frida-stack:
Users that are interested in frida-stack are comparing it to the libraries listed below
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆52Updated last week
- A zygisk module that dumps so file from process memory☆51Updated 5 months ago
- Find JNI native methods while the app is running.☆15Updated 4 months ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- Frida's setHardwareWatchpoint tutorial☆29Updated 5 months ago
- IDA plugin which queries Local language models to speed up reverse-engineering☆21Updated 10 months ago
- ☆29Updated 2 years ago
- ☆50Updated last year
- 使用 frida stalker 实现的 trace☆25Updated 2 years ago
- Dump process memory with FRIDA.☆16Updated last year
- Root takeover via signature spoofing in KernelSU☆17Updated last year
- App for learnfrida.info☆20Updated 2 years ago
- Obfuscated Binaries☆29Updated 2 years ago
- Small Apps As PoC to Detect Frida With Frida☆51Updated 3 years ago
- llvm with customised obfuscation optimisations☆14Updated 5 months ago
- A c++ (jni) implementation of KeyAttestation for Android☆22Updated last year
- tprt ollvm 反混淆 修改 binja il☆38Updated 6 months ago
- obpo backend server written by golang☆32Updated last year
- Android Overlay Hijack☆22Updated 6 months ago
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆31Updated 2 years ago
- A frida module to parse Elf headers in runtime☆32Updated 5 years ago
- A rootkit for Android.☆52Updated 9 months ago
- Featureful library for interacting with unix processes through ptrace, supports x86_64, i686, arm, aarch64 remote function calls☆42Updated last month
- 详细说明及演示MMU相关原理及过程(用于理解Linux内核Root Kernelpatch)☆21Updated 9 months ago
- deobfuscation BR☆42Updated last year
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆70Updated last year