Script to quickly hook natives call to JNI in Android
https://github.com/Areizen/JNI-Frida-Hook
#re #hook #android #mobile #darw1n
https://github.com/Areizen/JNI-Frida-Hook
#re #hook #android #mobile #darw1n
GitHub
GitHub - Areizen/JNI-Frida-Hook: Script to quickly hook natives call to JNI in Android
Script to quickly hook natives call to JNI in Android - Areizen/JNI-Frida-Hook
Automatic Hooking/Patching for Spotify on MacOS
https://medium.com/swlh/skiptracing-automated-hook-resolution-74eda756533d
#re #hook #capstone #ida #darw1n
https://medium.com/swlh/skiptracing-automated-hook-resolution-74eda756533d
#re #hook #capstone #ida #darw1n
Medium
Skiptracing: Automated Hook Resolution
This post is the third part of my series about tracking skips in the Spotify client. This post is a direct continuation of my work on theβ¦
Powerful automated tool for reverse engineering Unity IL2CPP binaries
https://github.com/djkaty/Il2CppInspector
#reverse #unity #tools #il2cpp #ida #ghidra #x64dbg #ilspy #dnspy #inject #hook #obfuscation #darw1n
https://github.com/djkaty/Il2CppInspector
#reverse #unity #tools #il2cpp #ida #ghidra #x64dbg #ilspy #dnspy #inject #hook #obfuscation #darw1n
GitHub
GitHub - djkaty/Il2CppInspector: Powerful automated tool for reverse engineering Unity IL2CPP binaries
Powerful automated tool for reverse engineering Unity IL2CPP binaries - djkaty/Il2CppInspector
A Comprehensive Guide to Hooking Windows APIs with Python
https://forum.reverse4you.org/t/a-comprehensive-guide-to-hooking-windows-apis-with-python/18152
#reverse #malware #inject #hook #tips #darw1n
https://forum.reverse4you.org/t/a-comprehensive-guide-to-hooking-windows-apis-with-python/18152
#reverse #malware #inject #hook #tips #darw1n
R0 CREW
A Comprehensive Guide to Hooking Windows APIs with Python
Developers apply API hooking practices to better understand how a system works, alter the behavior of an operating system or an application, detect malicious code, and build strong products. The majority of guides and tutorials on Windows API hooking areβ¦
π12π₯11
LayeredSyscall β Abusing VEH to Bypass EDRs
https://whiteknightlabs.com/2024/07/31/layeredsyscall-abusing-veh-to-bypass-edrs
#redteam #edr #hook #bypass
https://whiteknightlabs.com/2024/07/31/layeredsyscall-abusing-veh-to-bypass-edrs
#redteam #edr #hook #bypass
White Knight Labs
LayeredSyscall - Abusing VEH to Bypass EDRs | White Knight Labs
Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR hooks in Windows.
π₯6π΄3β€2π1