Kindness-Kismet

Rust PLT Hook 库

11
3
100% credibility
Found Mar 01, 2026 at 11 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Rust
AI Summary

A Rust library that lets Android apps intercept and replace specific function calls in shared libraries at runtime.

How It Works

1
🔍 Discover the tool

You hear about a handy way to tweak how Android apps work inside by swapping out certain actions.

2
📱 Add to your project

You easily include this helper in your Android app project so it's ready to use.

3
Create your custom action

You write a simple replacement for the app behavior you want to change, like redirecting a print message.

4
📍 Pick the target

You tell it exactly which library and action inside the app to swap with your custom one.

5
▶️ Turn it on

With one quick command, you activate the swap and let it handle new libraries automatically.

🎉 See it work

Your app now runs your custom actions seamlessly, making it behave just how you dreamed.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 11 to 11 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is srx_hook?

srx_hook is a Rust library for PLT hooking on Android 64-bit binaries, letting you intercept native function calls in shared objects like libc.so without crashing the process. It handles dynamic loading via dlopen events, supports precise targeting with rules like libtarget.so@base%instance, and provides safe proxy chaining with cycle detection. Developers get a task-based API—init, hook_single, refresh, unhook—that works alongside rust github actions ci for testing.

Why is it gaining traction?

It stands out from C++ alternatives like ByteHook by using Rust's safety for memory protection and signal guards, avoiding conflicts with other hooks. Runtime additions without full refresh, plus auto-fallback scans, make it reliable for live hooking; extensive stress tests cover concurrent calls and leaks via rust github workflow. The hub-trampoline design ensures independent unhooks, perfect for layered interceptions in complex apps.

Who should use this?

Android reverse engineers hooking JNI calls in games or apps, security researchers tracing native APIs, and modders overriding lib functions precisely. Ideal for anyone building rust github client tools or injectors needing stable PLT rust hook without manual ELF parsing.

Verdict

Try it for targeted Android native interception—solid API and marathon-tested via rust github actions cache—but with 11 stars and 1.0% credibility score, it's early; pair with your own validation before production. MIT licensed, real-device ready.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.