A tool that traces system calls using eBPF
☆268Oct 31, 2024Updated last year
Alternatives and similar repositories for eStrace
Users that are interested in eStrace are comparing it to the libraries listed below
Sorting:
- A cli tool to install a hardware breakpoint/watchpoint on a process in linux.☆246Jul 6, 2024Updated last year
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆199Jun 15, 2024Updated last year
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆648May 14, 2024Updated last year
- 基于eBPF的syscall追踪工具,适用于安卓平台☆326Oct 24, 2023Updated 2 years ago
- 基于eBPF的堆栈追踪工具☆1,353Jan 11, 2026Updated last month
- ☆122Nov 24, 2022Updated 3 years ago
- 劫持Zygote在App启动前注入so☆347Jan 22, 2026Updated last month
- eBPF Android Debug Bridge☆547Mar 30, 2024Updated last year
- Seccomp + Signal Intercept SVC☆92Aug 18, 2023Updated 2 years ago
- 基于 frida 可监控 native 方法调用☆69Jun 16, 2023Updated 2 years ago
- ☆122Mar 18, 2022Updated 3 years ago
- ☆417Mar 17, 2023Updated 2 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆155Jul 11, 2024Updated last year
- eBPF-based lightweight debugger for Android☆757Dec 27, 2025Updated 2 months ago
- Remap a library to avoid detection☆132Feb 1, 2024Updated 2 years ago
- ☆387Mar 29, 2025Updated 11 months ago
- 一个基于ptrace-seccomp简单的重定向openat的demo☆81Dec 14, 2022Updated 3 years ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk 是否处于异常环境。☆82Dec 13, 2022Updated 3 years ago
- a few android analysis tools, jni trace by native hook, Java Object Format to Json for Xposed and Frida☆187Oct 20, 2025Updated 4 months ago
- Modify Android linker to provide loading module and hook function☆463Oct 13, 2025Updated 4 months ago
- Android system call hook☆228Jan 22, 2025Updated last year
- A library for hiding and retrieving imports in ELF binaries.☆192Apr 18, 2025Updated 10 months ago
- Code injection on Android without ptrace☆280Mar 20, 2024Updated last year
- Single-step debugging of native code using frida, stalker, and semaphore☆87Oct 9, 2024Updated last year
- Instruction tracer powered by Frida☆153Jun 9, 2025Updated 8 months ago
- Run `strace` on program that is under another debugger☆18Aug 6, 2023Updated 2 years ago
- A binder interceptor framework for Android☆366Jun 24, 2024Updated last year
- 关于Magisk生态的研究☆160Apr 29, 2024Updated last year
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆127Jan 26, 2024Updated 2 years ago
- A kernel module for tracing signal☆31Jan 17, 2023Updated 3 years ago
- eBPF-Based DexDumper for Android☆367Dec 8, 2025Updated 2 months ago
- Is a protect Android App anti any attacks and environments.☆356Dec 28, 2023Updated 2 years ago
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆242Feb 22, 2023Updated 3 years ago
- Root takeover via signature spoofing in KernelSU☆19Oct 11, 2023Updated 2 years ago
- Linux ARM64内核硬件进程内存读写驱动、硬件断点调试驱动。硬件级读写Linux进程内存、硬件级下断点。☆892Dec 4, 2025Updated 2 months ago
- A zygisk module that dumps so file from process memory☆96Oct 9, 2024Updated last year
- A simple android NativeHook library.☆119May 19, 2025Updated 9 months ago
- 自己收集与编写的常用IDA脚本,通常用于反混淆☆91Feb 28, 2025Updated last year
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆249Jan 23, 2026Updated last month