rk700 / dlfunc
Bypass dynamic linking function restriction on Android by forging caller address
☆35Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for dlfunc
- get android app signature without java api☆32Updated 5 years ago
- search all symbal in ELF file(dlsym can not find)☆27Updated 5 years ago
- Android eBPF sample☆45Updated 2 years ago
- translator from dex bytecode into LLVM ir☆52Updated 2 years ago
- Custom linker implemented with Segmentation Fault handler☆19Updated 4 years ago
- monitor svc calls of android☆72Updated 6 years ago
- ☆31Updated 7 months ago
- ☆71Updated 5 years ago
- Trace jni calls with eBPF on Android☆24Updated 2 years ago
- ☆27Updated 7 years ago
- framenthook☆62Updated 5 years ago
- Simple Android ARM&ARM64 GOT Hook☆34Updated 2 years ago
- android injext dex☆56Updated 6 years ago
- Dynamic java method hook for Android,Implemented by jvmti☆36Updated 7 months ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆56Updated 4 years ago
- ARM Emulator Developing(interp + jit + aot)☆27Updated 4 years ago
- rewrite dex file☆40Updated 2 years ago
- Android system call hook☆118Updated last month
- ☆49Updated 6 years ago
- ☆17Updated 2 years ago
- Dynamic java method hook for Android,Implemented by jvmti☆9Updated 9 months ago
- 利用android_inject和hookZz框架写的Android zygote注入andorid程序☆37Updated 5 years ago
- 转换Pxx的vmp文件(check.bin, mw.bin)到.class☆27Updated last year
- AArch64 inlineHook☆43Updated 2 years ago
- Android ask repacked detect.☆13Updated 3 years ago
- Reverse Engineering about 360 android app guard☆57Updated 4 years ago
- 自實現Linker的小Demo☆52Updated 4 months ago
- jeb Decrypt python script☆19Updated 5 years ago