rk700 / dlfuncLinks
Bypass dynamic linking function restriction on Android by forging caller address
☆41Updated 3 years ago
Alternatives and similar repositories for dlfunc
Users that are interested in dlfunc are comparing it to the libraries listed below
Sorting:
- get android app signature without java api☆35Updated 7 years ago
- A frida module to parse Elf headers in runtime☆37Updated 6 years ago
- search all symbal in ELF file(dlsym can not find)☆37Updated 6 years ago
- translator from dex bytecode into LLVM ir☆55Updated 3 years ago
- AArch64 inlineHook☆57Updated 3 years ago
- Custom linker implemented with Segmentation Fault handler☆22Updated 6 years ago
- rewrite dex file☆42Updated 4 years ago
- ☆33Updated 3 years ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆60Updated 5 years ago
- ☆75Updated 6 years ago
- A linux / android / MacOS hooking framework☆115Updated 3 years ago
- Reverse Engineering about 360 android app guard☆58Updated 5 years ago
- ☆23Updated 3 years ago
- ART tracing research☆92Updated 2 years ago
- Android-Syscall-Logger☆22Updated 4 years ago
- deobfuscator llvm arm64 script☆95Updated 6 years ago
- IDA plugin, unwind stack trace when debugging arm.☆139Updated 5 years ago
- jeb Decrypt python script☆20Updated 6 years ago
- monitor svc calls of android☆74Updated 7 years ago
- codeless Android hook (experimental)☆67Updated 3 years ago
- Android eBPF sample☆51Updated 3 years ago
- This is another way to bypass the restriction of calling dl functions for system lib.☆76Updated 4 years ago
- Simple Android ARM&ARM64 GOT Hook☆37Updated 3 years ago
- ☆52Updated 7 years ago
- ARM Emulator Developing(interp + jit + aot)☆28Updated 5 years ago
- Emulator Native Hooking Framework based on Xposed☆50Updated 7 years ago
- framenthook☆62Updated 6 years ago
- android应用反调试以及反内存dump代码收集☆32Updated 9 years ago
- android injext dex☆57Updated 7 years ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago