tiann / eadb
eBPF Android Debug Bridge
☆466Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for eadb
- 基于eBPF的堆栈追踪工具☆924Updated last month
- 基于eBPF的syscall追踪工具,适用于安卓平台☆314Updated last year
- Extended Android Tools is a place to host and maintain a build environment and makefiles cross compiling Linux tools we all love for Andr…☆189Updated 2 months ago
- Modify Android linker to provide loading module and hook function☆381Updated last month
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆548Updated 6 months ago
- A binder interceptor framework for Android☆286Updated 4 months ago
- Java runtime interop from Frida☆329Updated 2 months ago
- Is a protect Android App anti any attacks and environments.☆328Updated 10 months ago
- Android内联hook框架☆322Updated 4 years ago
- A debian-based shell environment designed for Android and adb☆319Updated last year
- A tool that traces system calls using eBPF☆219Updated 3 weeks ago
- 通过内存特征检测frida☆466Updated 5 years ago
- 利用 frida 获取 Jni RegisterNatives 动态注册的函数☆308Updated last year
- Android get/set system properties☆82Updated 3 years ago
- 无限期停更,请移步 https://5ec1cff.github.io/my-blog☆277Updated last year
- 一个小脚本,用于trace so中native函数的调用。☆475Updated 3 years ago
- Build an .so file to automatically do the android_native_hook work. Supports ARM64 ! With this, tools like Xposed can do android native h…☆273Updated 6 years ago
- Jnitrace for cpp☆252Updated 7 months ago
- ☆765Updated 3 years ago
- Engine used by jnitrace to intercept JNI API calls.☆313Updated last year
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuilding☆436Updated 4 years ago
- xDL is an enhanced implementation of the Android DL series functions.☆450Updated last month
- ☆317Updated 2 weeks ago
- android memory access trace utility powered by frida framework☆228Updated 2 years ago
- ☆297Updated 6 months ago
- An android Dex protects shell implementation☆571Updated this week
- The second generation Android Hardening Protection☆389Updated 6 years ago
- Allows you to partly emulate an Android native library.☆347Updated 4 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆540Updated 3 weeks ago
- 🔨 Break Java Reverse Engineering form Memory World!☆821Updated last year