ricardoteixas / hookLinks
hook: linux kernel syscall hijack
☆21Updated 9 years ago
Alternatives and similar repositories for hook
Users that are interested in hook are comparing it to the libraries listed below
Sorting:
- This is simple kernel module can get and replace any linux syscall. Nowadays needs some hacks, on x86 platform. Can be used on ARM and x8…☆12Updated 13 years ago
- Android runtime jit binary file parser☆13Updated 8 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆47Updated 8 years ago
- JEB Scripts☆21Updated 11 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- some idapython scripts for android debugging.☆45Updated 8 years ago
- ☆24Updated 8 years ago
- Dalvik Header Plugin for IDA Pro☆23Updated 12 years ago
- Malicious use of ELF such as .so inject, func hook and so on.☆77Updated 8 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆15Updated 7 years ago
- 娜迦DEX文件修复程序☆25Updated 8 years ago
- A collection of tools for injecting DSOs in processes under various operating systems☆52Updated 3 years ago
- ☆16Updated 6 years ago
- JNI Helper Plugin☆54Updated last year
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Updated 8 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- ☆24Updated 8 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 8 years ago
- IDA debugging plugin for android armv7 so☆87Updated 7 years ago
- ELF obfuscator☆70Updated 10 years ago
- LD_PRELOAD magic for Android's AssetManager☆81Updated 3 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 9 years ago
- ☆41Updated 8 years ago
- Dynamic binary analysis via platform emulation☆12Updated 7 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- ☆22Updated 7 years ago
- a android shared library dynamic loader☆20Updated 9 years ago
- A Fork of Auditd geared specifically for running on the Android platform. Includes system applications, AOSP patches, and kernel patches …☆47Updated 12 years ago