thouger / android_study
☆10Updated 3 months ago
Alternatives and similar repositories for android_study:
Users that are interested in android_study are comparing it to the libraries listed below
- 研究内核改机策略☆54Updated 11 months ago
- Inotify监听测试☆33Updated 2 years ago
- 魔改sandhook特征,MikRom注入dex实现免root的xposed案例☆35Updated 2 years ago
- use xposed inject so☆17Updated 4 years ago
- frida打印java调用栈的详细信息☆34Updated last week
- ☆17Updated 2 years ago
- Xposed 注释版本☆12Updated 4 years ago
- 注入so使用dobby的demo☆18Updated 2 years ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆60Updated 2 years ago
- A zygisk module that hooks `libdexfile.so` to dump dex☆41Updated 2 months ago
- GitHub Actions to analyse file using IDA☆27Updated 3 months ago
- xposed 通用模板☆21Updated 3 years ago
- ☆47Updated last year
- Single-step debugging of native code using frida, stalker, and semaphore☆74Updated 4 months ago
- 一个基于ptrace-seccomp简单的重定向openat的demo☆63Updated 2 years ago
- 用于练手的环境检测的demo☆75Updated last year
- 检测got hook(使用xhook测试)☆25Updated 3 years ago
- Remap a library to avoid detection☆101Updated last year
- 获取更详细的Java调用栈,即使清除调试信息并混淆也能知道那个方法报错☆15Updated 8 months ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆54Updated 2 months ago
- frida runtime resolves smali☆80Updated 3 months ago
- A Project for people to study android svc.☆25Updated 2 years ago
- Zygisk module template.☆23Updated 10 months ago
- dump dex for android 14☆45Updated 4 months ago
- ☆19Updated 2 years ago
- 自實現Linker的小Demo☆58Updated 7 months ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆16Updated 9 months ago
- this is Android Custom Linker by Android12 LinkerSourcesCode☆38Updated 10 months ago
- inline hook tools☆21Updated 3 years ago