rk700 / dlfunc
Bypass dynamic linking function restriction on Android by forging caller address
☆35Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for dlfunc
- search all symbal in ELF file(dlsym can not find)☆27Updated 5 years ago
- get android app signature without java api☆32Updated 5 years ago
- ☆72Updated 5 years ago
- Custom linker implemented with Segmentation Fault handler☆19Updated 5 years ago
- ☆27Updated 7 years ago
- ☆17Updated 2 years ago
- ☆49Updated 6 years ago
- framenthook☆62Updated 5 years ago
- ☆31Updated 7 months ago
- android injext dex☆56Updated 6 years ago
- Android eBPF sample☆45Updated 2 years ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆56Updated 4 years ago
- Reverse Engineering about 360 android app guard☆57Updated 4 years ago
- monitor svc calls of android☆72Updated 6 years ago
- AArch64 inlineHook☆44Updated 2 years ago
- ollvm, base on llvm-clang 18.x☆71Updated 9 months ago
- translator from dex bytecode into LLVM ir☆52Updated 2 years ago
- Simple Android ARM&ARM64 GOT Hook☆34Updated 2 years ago
- Trace jni calls with eBPF on Android☆24Updated 2 years ago
- ☆21Updated 4 years ago
- 隐藏关键方法的相关调用☆57Updated 7 years ago
- Android ask repacked detect.☆13Updated 3 years ago
- 一个基于ptrace-seccomp简单的重定向openat的demo☆61Updated last year
- unicorn demo☆25Updated 4 years ago
- deobfuscator llvm arm64 script☆88Updated 5 years ago
- Dynamic java method hook for Android,Implemented by jvmti☆36Updated 7 months ago