All Projects → strazzere → Android Lkms

strazzere / Android Lkms

Licence: gpl-2.0
Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Android Lkms

Ksdumper
Dumping processes using the power of kernel space !
Stars: ✭ 454 (+176.83%)
Mutual labels:  kernel, reverse-engineering
Ksm
A fast, hackable and simple x64 VT-x hypervisor for Windows and Linux. Builtin userspace sandbox and introspection engine.
Stars: ✭ 673 (+310.37%)
Mutual labels:  kernel, reverse-engineering
Anticheat Testing Framework
Framework to test any Anti-Cheat
Stars: ✭ 481 (+193.29%)
Mutual labels:  kernel, reverse-engineering
Wnfun
WNF Utilities 4 Newbies (WNFUN)
Stars: ✭ 63 (-61.59%)
Mutual labels:  kernel, reverse-engineering
The holy book of x86
A simple guide to x86 architecture, assembly, memory management, paging, segmentation, SMM, BIOS....
Stars: ✭ 577 (+251.83%)
Mutual labels:  kernel, reverse-engineering
Ipod Gadget
iPod usb gadget for audio playback
Stars: ✭ 94 (-42.68%)
Mutual labels:  kernel, reverse-engineering
Degate
Open source software for chip reverse engineering.
Stars: ✭ 156 (-4.88%)
Mutual labels:  reverse-engineering
Rbasefind
A firmware base address search tool.
Stars: ✭ 159 (-3.05%)
Mutual labels:  reverse-engineering
Edb Debugger
edb is a cross-platform AArch32/x86/x86-64 debugger.
Stars: ✭ 2,019 (+1131.1%)
Mutual labels:  reverse-engineering
Gymnasticon
Make obsolete and/or proprietary exercise bikes work with popular cycling training apps like Zwift, TrainerRoad, Rouvy and more.
Stars: ✭ 155 (-5.49%)
Mutual labels:  reverse-engineering
Antidebugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-1.83%)
Mutual labels:  reverse-engineering
Androidlibrary
Android library to reveal or obfuscate strings and assets at runtime
Stars: ✭ 162 (-1.22%)
Mutual labels:  reverse-engineering
Js Reverse
JS逆向研究
Stars: ✭ 159 (-3.05%)
Mutual labels:  reverse-engineering
Pubg Pak Hacker
use windows kernel deriver hidden file and itself to Bypass BE
Stars: ✭ 157 (-4.27%)
Mutual labels:  kernel
Synestiaos
The Synestia Operating System
Stars: ✭ 159 (-3.05%)
Mutual labels:  kernel
Cmd
Command line tools for database operation written by Go, moved to https://gitea.com/xorm/cmd
Stars: ✭ 154 (-6.1%)
Mutual labels:  reverse-engineering
Anno1800 Mod Loader
The one and only mod loader for Anno 1800, supports loading of unpacked RDA files, XML merging and Python mods.
Stars: ✭ 161 (-1.83%)
Mutual labels:  reverse-engineering
Jupiter
A Windows virtual memory editing library with support for pattern scanning.
Stars: ✭ 156 (-4.88%)
Mutual labels:  reverse-engineering
Binja Retdec
Binary Ninja plugin to decompile binaries using RetDec API
Stars: ✭ 158 (-3.66%)
Mutual labels:  reverse-engineering
Frida Ios Dump
pull decrypted ipa from jailbreak device
Stars: ✭ 2,223 (+1255.49%)
Mutual labels:  reverse-engineering

android-lkms

Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators.

  • antiptrace - simple ptrace hooking module for use to aid in reversing native applications on Android
  • open-read-write - hooks lots of functions in an attempt to find out what files a piece of malware was touching
  • antiunlink - prevents a specificed package name from unlinking files in it's own directory, specifically for use against dexprotector

Warning

Beware using any of these in a production like environment, they have been tested only in my personal qemu environments. Some are (bad) attempts at trying different methods of hooking things to see the outcome. The results may be unexpected and cause qemu environments to slow down due to performing slower operations in the kernel than you should be. Someone help your poor soul if you try to run all of these on a real device.

Compiling

Edit the Makefile prior and ensure that the paths are correct for your system. There are assumptions made how your environments are set up. You will also need the 'sys_call_table' from the compiled kernel - which is grabbed automatically by a script. You can manually insert this value into android_module.h if you would prefer.

Using the LKMS

I've written a blog about setting up an OSX environment for compiling the a Kernel capable of running LKMs, you should reference this for a quick and easy how-to; Compiling an Android Emulator Kernel for Loadable Kernel Modules

[email protected]

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].