rk700 / dlfunc
Bypass dynamic linking function restriction on Android by forging caller address
☆35Updated 2 years ago
Alternatives and similar repositories for dlfunc:
Users that are interested in dlfunc are comparing it to the libraries listed below
- search all symbal in ELF file(dlsym can not find)☆27Updated 5 years ago
- ☆72Updated 5 years ago
- Android eBPF sample☆46Updated 2 years ago
- get android app signature without java api☆32Updated 6 years ago
- ☆33Updated 9 months ago
- elf loader implementation in rust☆14Updated 6 years ago
- AArch64 inlineHook☆46Updated 2 years ago
- ☆19Updated 3 years ago
- unicorn demo☆26Updated 4 years ago
- framenthook☆63Updated 5 years ago
- translator from dex bytecode into LLVM ir☆53Updated 2 years ago
- Simple Android ARM&ARM64 GOT Hook☆34Updated 2 years ago
- Custom linker implemented with Segmentation Fault handler☆21Updated 5 years ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆56Updated 4 years ago
- Trace jni calls with eBPF on Android☆25Updated 2 years ago
- monitor svc calls of android☆72Updated 6 years ago
- Reverse Engineering about 360 android app guard☆57Updated 4 years ago
- ollvm, base on llvm-clang 18.x☆73Updated 11 months ago
- jeb Decrypt python script☆19Updated 5 years ago
- Dynamic java method hook for Android,Implemented by jvmti☆44Updated 9 months ago
- ☆22Updated 3 years ago
- deobfuscator llvm arm64 script☆88Updated 5 years ago
- android injext dex☆57Updated 6 years ago
- ART tracing research☆87Updated 2 years ago
- Android-Syscall-Logger☆21Updated 3 years ago
- 一个基于ptrace-seccomp简单的重定向openat的demo☆62Updated 2 years ago