tiann / eadbLinks
eBPF Android Debug Bridge
☆509Updated last year
Alternatives and similar repositories for eadb
Users that are interested in eadb are comparing it to the libraries listed below
Sorting:
- 基于eBPF的堆栈追踪工具☆1,122Updated 2 months ago
- 基于eBPF的syscall追踪工具,适用于安卓平台☆322Updated last year
- A binder interceptor framework for Android☆323Updated 11 months ago
- Extended Android Tools is a place to host and maintain a build environment and makefiles cross compiling Linux tools we all love for Andr…☆224Updated last week
- Modify Android linker to provide loading module and hook function☆429Updated 2 weeks ago
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆607Updated last year
- https://5ec1cff.github.io/my-blog☆320Updated last year
- ☆369Updated 2 months ago
- Is a protect Android App anti any attacks and environments.☆342Updated last year
- A tool that traces system calls using eBPF☆245Updated 7 months ago
- Android内联hook框架☆331Updated 5 years ago
- xDL is an enhanced implementation of the Android DL series functions.☆522Updated 3 weeks ago
- A debian-based shell environment designed for Android and adb☆330Updated 2 years ago
- Build an .so file to automatically do the android_native_hook work. Supports ARM64 ! With this, tools like Xposed can do android native h…☆282Updated 6 years ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆451Updated 5 years ago
- Jnitrace for cpp☆280Updated last year
- An android Dex protects shell implementation☆709Updated last month
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆176Updated last year
- DexDumper based eBPF on Android Platform☆186Updated 5 months ago
- 利用 frida 获取 Jni RegisterNatives 动态注册的函数☆336Updated 2 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆613Updated 3 months ago
- Lightweight ARMv8-A(ARM64, AArch64, Little-Endian) Inline Hook Library for Android C/C++☆685Updated 2 years ago
- 通过内存特征检测frida☆493Updated 5 years ago
- ☆340Updated last year
- ☆861Updated 4 years ago
- 一个小脚本,用于trace so中native函数的 调用。☆545Updated 3 years ago
- eBPF安全开发、安卓系统与内核定制、Frida源码分析与对抗、沙箱开发等课程🔥☆250Updated 2 weeks ago
- Engine used by jnitrace to intercept JNI API calls.☆320Updated last year
- Android 加固应用Hook方式-Frida☆283Updated 2 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆99Updated 11 months ago