wszxl516 / syscall_hookLinks
linux x86_64 and arm64 syscall hook
☆22Updated 2 years ago
Alternatives and similar repositories for syscall_hook
Users that are interested in syscall_hook are comparing it to the libraries listed below
Sorting:
- Inotify监听测试☆35Updated 3 years ago
- GitHub Actions to analyse file using IDA☆35Updated last year
- ☆60Updated 3 years ago
- zygisk插件:用于unity游戏hook☆19Updated 3 years ago
- A rootkit for Android.☆62Updated last year
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆58Updated last year
- A Project for people to study android svc.☆25Updated 3 years ago
- ☆34Updated last year
- A c++ (jni) implementation of KeyAttestation for Android☆32Updated last year
- C++的内存指针链扫描☆28Updated 3 weeks ago
- A kernel module for tracing signal☆31Updated 3 years ago
- ☆13Updated 2 years ago
- llvm with customised obfuscation optimisations☆15Updated last year
- android8 arm64 注入方案☆37Updated 4 years ago
- Android AntiCheat☆48Updated 3 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆66Updated last year
- A simple android utility for inject so (suport arm, aarch64)☆28Updated 2 years ago
- APatch KernelPatch QEMU Debug Environment☆21Updated last year
- hook surfaceflinger进程的eglSwapBuffers方式实现绘制,适用arm64 root下的安卓真机☆36Updated 3 years ago
- Draw on Canvas based Overlay with RootService☆19Updated last year
- ☆39Updated 3 months ago
- 自實現Linker的小Demo☆76Updated 8 months ago
- 本工具用于解决ollvm编译出来的Linux驱动文件,加载进内核会报错“please compile with -fno-common”的问题☆39Updated 4 years ago
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆39Updated 10 months ago
- ☆18Updated 4 years ago
- 使用 frida stalker 实现的 trace☆29Updated 3 years ago
- hwBreakpoint Test App☆19Updated 3 years ago
- It can help you better use Frida in SO binaries☆35Updated 2 years ago
- Dump Memory Segment From Process Memory and Rebuild ELF So Binaries☆31Updated 4 years ago
- Android VM Injector☆28Updated 2 years ago