strazzere / inject-hooks-android-rsLinks
Remote library injection into Android processes, then hooking via various methods
☆64Updated 2 months ago
Alternatives and similar repositories for inject-hooks-android-rs
Users that are interested in inject-hooks-android-rs are comparing it to the libraries listed below
Sorting:
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated last week
- A Simple uprobe Hook Framework☆66Updated 10 months ago
- obpo backend server written by golang☆33Updated 2 years ago
- 反ida内联汇编花指令☆54Updated 2 years ago
- NEVER EVER DISABLE SELINUX!!!☆22Updated 2 years ago
- kernel module for modifying device information...☆22Updated 4 months ago
- 详细说明及演示MMU相关原理及过程(用于理解Linux内核Root Kernelpatch)☆23Updated last year
- 使用 frida stalker 实现的 trace☆29Updated 3 years ago
- Getting better stacks and backtraces in Frida☆58Updated 2 months ago
- LLVM pass plugin developed based on LLVM , implemented in Rust, designed for obfuscator-llvm☆93Updated this week
- 更稳定的劫持Zygote在App启动前注入so☆121Updated last week
- Find JNI native methods while the app is running.☆21Updated last year
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆39Updated 10 months ago
- Featureful library for interacting with unix processes through ptrace, supports x86_64, i686, arm, aarch64 remote function calls☆52Updated 3 weeks ago
- Android eBPF sample☆52Updated 3 years ago
- tprt ollvm 反混淆 修改 binja il☆50Updated last year
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 6 months ago
- try try full features ebpf on android without Pixel 6☆22Updated 3 years ago
- 基于 Unicorn 引擎的轻量级 ARM64 动态追踪模拟工具。支持 IDA Pro、生成 Tenet 日志、本地代码模拟、内存转储、寄存器状态追踪和指令级日志记录。☆171Updated 3 weeks ago
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆27Updated last year
- llvm with customised obfuscation optimisations☆15Updated last year
- deobfuscation BR☆53Updated last year
- Single-step debugging of native code using frida, stalker, and semaphore☆86Updated last year
- APatch KernelPatch QEMU Debug Environment☆21Updated last year
- A rootkit for Android.☆62Updated last year
- deobf tx libtprt's obfuscation☆56Updated last year
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆78Updated 3 years ago
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…