ri-char / eStraceLinks
A tool that traces system calls using eBPF
☆248Updated 8 months ago
Alternatives and similar repositories for eStrace
Users that are interested in eStrace are comparing it to the libraries listed below
Sorting:
- 基于eBPF的syscall追踪工具,适用于安卓平台☆321Updated last year
- DexDumper based eBPF on Android Platform☆195Updated 6 months ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆180Updated last year
- Trace Android framework API, native libraries, system calls and other events using eBPF☆103Updated last year
- A dynamic dex dumper, implemented in rust, no frida.☆139Updated 2 years ago
- A cli tool to install a hardware breakpoint/watchpoint on a process in linux.☆226Updated last year
- 关于Magisk生态的研究☆150Updated last year
- Android system call hook☆212Updated 5 months ago
- ☆120Updated 2 years ago
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆197Updated 3 months ago
- Dynamic java method hook for Android,Implemented by jvmti☆49Updated last year
- smali trace☆173Updated 3 years ago
- Do something to fit android aarch64 to develop ebpf programs using libbpf-bootstrap framework☆38Updated last year
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆117Updated last year
- linux kernel inline hook☆130Updated 2 years ago
- Code injection on Android without ptrace☆246Updated last year
- ☆128Updated 2 weeks ago
- 劫持Zygote在App启动前注入so☆305Updated 9 months ago
- arm汇编学习_linker学习笔记_Android逆向学习笔记☆138Updated 9 months ago
- ☆35Updated 3 weeks ago
- ☆82Updated 7 months ago
- ☆165Updated 3 weeks ago
- System Call Hook for ARM64☆159Updated last month
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆196Updated 2 months ago
- eBPF安全开发、安卓系统与内核定制、Frida源码分析与对抗、沙箱开发等课程🔥☆253Updated last week
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆237Updated 2 years ago
- VirtualApp 原理速览☆38Updated 2 months ago
- ☆120Updated 3 years ago
- android memory access trace utility powered by frida framework☆241Updated 3 years ago
- A Simple uprobe Hook Framework☆51Updated 3 months ago