ri-char / eStraceLinks
A tool that traces system calls using eBPF
☆244Updated 7 months ago
Alternatives and similar repositories for eStrace
Users that are interested in eStrace are comparing it to the libraries listed below
Sorting:
- 基于eBPF的syscall追踪工具,适用于安卓平台☆321Updated last year
- DexDumper based eBPF on Android Platform☆179Updated 4 months ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆173Updated 11 months ago
- A cli tool to install a hardware breakpoint/watchpoint on a process in linux.☆220Updated 11 months ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆99Updated 10 months ago
- linux kernel inline hook☆125Updated 2 years ago
- A dynamic dex dumper, implemented in rust, no frida.☆135Updated 2 years ago
- 关于Magisk生态的研究☆137Updated last year
- 劫持Zygote在App启动前注入so☆285Updated 8 months ago
- ☆119Updated 2 years ago
- Android system call hook☆203Updated 4 months ago
- eBPF Android Debug Bridge☆507Updated last year
- ☆112Updated this week
- Tenet的修复版本,支持了ida9.0,增加了类似LLDB的调试逻辑,优化了界面,增加了arm64的支持,以及ALSR部分的重写☆175Updated last month
- hook or replace arbitary linux kernel functions in runtime, supporting arm32, arm64, x86, x86_64☆190Updated 4 months ago
- Code injection on Android without ptrace☆244Updated last year
- ☆162Updated last week
- oneplus 7t 自定义内核(for 安卓逆向/外挂分析)☆235Updated 2 years ago
- Dynamic java method hook for Android,Implemented by jvmti☆25Updated last year
- 一个IDA插件,利用frida-stalker在加载so时打印出所有函数调用,解决frida-trace无法在so加载时trace的问题☆176Updated 3 weeks ago
- System Call Hook for ARM64☆153Updated last month
- eBPF安全开发、安卓系统与内核定制、Frida源码分析与对抗、沙箱开发等课程🔥☆250Updated 2 weeks ago
- smali trace☆170Updated 3 years ago
- arm汇编学习_linker学习笔记_Android逆向学习笔记☆135Updated 7 months ago
- Automatically de-obfuscate ollvm and generate binaries☆111Updated 3 years ago
- ☆368Updated 2 months ago
- ☆117Updated 3 years ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆111Updated last year
- blackbox☆170Updated last month
- 一个自定义注入so的脚手架☆168Updated 6 months ago