AndroidPtraceInject icon indicating copy to clipboard operation
AndroidPtraceInject copied to clipboard

Android Ptrace Inject for all ABIs and all APIs. Help you inject Shared Library on Android.

Results 9 AndroidPtraceInject issues
Sort by recently updated
recently updated
newest added

Does it works on Android Emulator such as LDPlayer and Nox??

Emulators such as noxplayer use different sdk versions, which made the Injector not work on these platforms. This has been fixed by adding a check for x86.

你好。 我按照說明做了一切,但是我得到一個錯誤: [+] LibPath = /data/local/tmp/libHook.so [-] Write Remote Memory error, MemoryAddr:0x0, err:I/O error [-] Write LibPath:/data/local/tmp/libHook.so to RemoteProcess error [+] detach process success, pid:31658 [-] Inject Erro 這種情況我需要做什麼?

修复x86_64(模拟器)bug需要处理2个地方: 1.当前压栈后堆栈不平衡 2.少写了个地方导致无法正常call mmap 可参考: fix from https://github.com/coff33h/LinuxInjector/blob/main/injector.c

Hello,是否可以在 libHook.so 中写 JNI_OnLoad,我这样写,可以编译成功,但是没有执行,使用的平台是 arm64-v8a。 ``` jint JNI_OnLoad(JavaVM* vm, void* reserved) { LOGD("JNI_OnLoad\n"); JNIEnv* env = NULL; if (vm->GetEnv((void**)&env, JNI_VERSION_1_6) != JNI_OK) { LOGD("JavaVm fail to get JNIEnv\n"); return -1;...

cannot inject into any app [+] ptrace_call mmap success, return value=FFFFFFFFFFFFFFFC, pc=7B5851976AA0 [+] Remote Process Map Memory Addr:0xfffffffffffffffc [+] linker_path value:/apex/com.android.runtime/bin/linker64 [+] [get_remote_func_addr] lmod=0x785E24757000, rmod=0x7B585117A000, lfunc=0x785E24758B50, rfunc=0x7B585117BB50 [+] dlopen RemoteFuncAddr:0x7b585117bb50...

# 我不理解这个`0x8000`的判断是啥意思 when i review ur source code, in function `get_module_base_addr`(`Utils.h`) what does 0x8000 means? ```C++ if (ModuleBaseAddr == 0x8000) ModuleBaseAddr = 0; ``` The original function is ```C++ /**...