wizdzz / XposedInlineHook
Hook native with xposed
☆16Updated 2 years ago
Related projects: ⓘ
- A Project for people to study android svc.☆24Updated 2 years ago
- 来自大表哥的剑☆22Updated 5 years ago
- ☆23Updated this week
- Inotify监听测试☆29Updated 2 years ago
- An approach to utilize auditd under Android 6+☆21Updated 6 years ago
- Android-Syscall-Logger☆18Updated 3 years ago
- ☆20Updated 4 years ago
- AArch64 inlineHook☆40Updated 2 years ago
- hwBreakpoint Test App☆16Updated last year
- try try full features ebpf on android without Pixel 6☆21Updated last year
- ☆28Updated 2 years ago
- get android app signature without java api☆32Updated 5 years ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆37Updated last year
- android hide root demo, code from Magisk☆19Updated 5 years ago
- this is Android Custom Linker by Android12 LinkerSourcesCode☆30Updated 5 months ago
- ☆25Updated 3 months ago
- monitor svc calls of android☆71Updated 6 years ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆24Updated 3 months ago
- ☆19Updated this week
- A zygisk module that hooks `libdexfile.so` to dump dex☆25Updated 3 weeks ago
- jeb Decrypt python script☆17Updated 5 years ago
- A rootkit for Android.☆35Updated 3 months ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆16Updated 8 months ago
- A kernel module for tracing signal☆23Updated last year
- zygisk插件:用于unity游戏hook☆15Updated last year
- 检测got hook(使用xhook测试)☆19Updated 3 years ago
- apatch kpm 模块通用内核读写内存 linux kernel read only support ARM64(based apatch)☆49Updated this week
- 使用 frida stalker 实现的 trace☆19Updated last year
- a poc implementation arm64 tracer based on simulation☆48Updated 3 years ago
- Root takeover via signature spoofing in KernelSU☆14Updated 11 months ago