suifei / arm64-assembly-simulator
ARM64 Assembly Code and Memory Simulator
☆26Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for arm64-assembly-simulator
- ☆29Updated 2 years ago
- Getting better stacks and backtraces in Frida☆32Updated 5 months ago
- A frida module to parse Elf headers in runtime☆31Updated 5 years ago
- IDA plugin which queries Local language models to speed up reverse-engineering☆20Updated 6 months ago
- Dump process memory with FRIDA.☆14Updated 8 months ago
- An approach to utilize auditd under Android 6+☆21Updated 6 years ago
- Obfuscated Binaries☆28Updated last year
- Android-Syscall-Logger☆19Updated 3 years ago
- Small Apps As PoC to Detect Frida With Frida☆51Updated 2 years ago
- GitHub Actions to analyse file using IDA☆19Updated this week
- 使用 frida stalker 实现的 trace☆21Updated last year
- ☆15Updated 3 years ago
- AArch64 inlineHook☆44Updated 2 years ago
- Update Frida hooks automatically.☆26Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆16Updated 10 months ago
- ☆47Updated last year
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆15Updated 6 months ago
- A zygisk module that dumps so file from process memory☆37Updated last month
- obpo backend server written by golang☆30Updated last year
- monitor svc calls of android☆72Updated 6 years ago
- A small script to get syscall info from its number (intented to be used with Frida)☆21Updated 3 years ago
- Use lief, keystone and capstone to manually inline hook elf(libil2cpp.so)☆28Updated 4 months ago
- 蛋蛋模拟器分析附件☆4Updated 2 years ago
- 详细说明及演示MMU相关原理及过程(用于理解Linux内核Root Kernelpatch)☆20Updated 5 months ago
- android app native so fuzz. efficiently run in a real machine with frida environment.☆37Updated 10 months ago
- Single-step debugging of native code using frida, stalker, and semaphore☆67Updated last month
- ☆21Updated 4 years ago
- dump dex for android 14☆39Updated last month
- Promon Shield String Deobfuscator☆25Updated 4 months ago