ri-char / eStrace
A tool that traces system calls using eBPF
☆242Updated 5 months ago
Alternatives and similar repositories for eStrace:
Users that are interested in eStrace are comparing it to the libraries listed below
- 基于eBPF的syscall追踪工具,适用于安卓平台☆320Updated last year
- A cli tool to install a hardware breakpoint/watchpoint on a process in linux.☆212Updated 9 months ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆165Updated 10 months ago
- DexDumper based eBPF on Android Platform☆117Updated 3 months ago
- A dynamic dex dumper, implemented in rust, no frida.☆131Updated 2 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆89Updated 9 months ago
- 劫持Zygote在App启动前注入so☆277Updated 7 months ago
- eBPF Android Debug Bridge☆501Updated last year
- Android system call hook☆197Updated 3 months ago
- 关于Magisk生态的研究☆133Updated 11 months ago
- linux kernel inline hook☆124Updated 2 years ago
- Dynamic java method hook for Android,Implemented by jvmti☆19Updated last year
- ☆116Updated 2 years ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆107Updated last year
- eBPF安全开发、安卓系统与内核定制、Frida源码分析与对抗、沙箱开发等课程🔥☆247Updated last week
- ☆159Updated 3 weeks ago
- ☆361Updated 3 weeks ago
- eBPF-based lightweight debugger for Android☆420Updated last week
- System Call Hook for ARM64☆139Updated 2 weeks ago
- Code injection on Android without ptrace☆235Updated last year
- smali trace☆164Updated 2 years ago
- 一个自定义注入so的脚手架☆139Updated 5 months ago
- Android Ptrace Inject for all ABIs and all APIs. Help you inject Shared Library on Android.☆214Updated 2 years ago
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆593Updated 11 months ago
- ☆117Updated 3 years ago
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆231Updated 2 years ago
- ☆145Updated 5 months ago
- ☆69Updated 2 weeks ago
- android memory access trace utility powered by frida framework☆235Updated 3 years ago
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆123Updated this week