rk700 / dlfunc
Bypass dynamic linking function restriction on Android by forging caller address
☆39Updated 3 years ago
Alternatives and similar repositories for dlfunc:
Users that are interested in dlfunc are comparing it to the libraries listed below
- get android app signature without java api☆33Updated 6 years ago
- search all symbal in ELF file(dlsym can not find)☆32Updated 6 years ago
- Android eBPF sample☆48Updated 2 years ago
- translator from dex bytecode into LLVM ir☆53Updated 2 years ago
- framenthook☆63Updated 5 years ago
- AArch64 inlineHook☆51Updated 2 years ago
- ☆20Updated 3 years ago
- ☆34Updated last week
- ☆52Updated 6 years ago
- ☆72Updated 5 years ago
- Simple Android ARM&ARM64 GOT Hook☆37Updated 2 years ago
- This is an injection tool that can inject xposed module to debuggable app by jdwp.☆48Updated 3 years ago
- rewrite dex file☆41Updated 3 years ago
- monitor svc calls of android☆73Updated 6 years ago
- This is another way to bypass the restriction of calling dl functions for system lib.☆74Updated 3 years ago
- Custom linker implemented with Segmentation Fault handler☆21Updated 5 years ago
- 转换Pxx的vmp文件(check.bin, mw.bin)到.class☆28Updated 2 years ago
- Dynamic java method hook for Android,Implemented by jvmti☆46Updated last year
- Python3 useful scripts.☆34Updated 4 years ago
- unicorn demo☆26Updated 4 years ago
- A frida module to parse Elf headers in runtime☆34Updated 5 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago
- ☆27Updated 8 years ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆56Updated 4 years ago
- a poc implementation arm64 tracer based on simulation☆54Updated 3 years ago
- Dynamic java method hook for Android,Implemented by jvmti☆19Updated last year
- android injext dex☆57Updated 6 years ago
- ☆22Updated 3 years ago
- android8 arm64 注入方案☆36Updated 3 years ago
- ART tracing research☆91Updated 2 years ago