aimardcr

Android library to intercept ELF .init_array/.fini_array execution with pre/post callbacks. All ABIs, Android 5.0+.

10
0
100% credibility
Found Mar 25, 2026 at 10 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
C++
AI Summary

This Android library lets app makers monitor when native components initialize and shut down, with alerts before and after.

How It Works

1
πŸ” Discover the library watcher

You hear about a simple tool that lets you peek inside your Android app to see when its hidden parts start working.

2
πŸ“₯ Add the watcher to your project

Copy a few easy files into your app's folder so it can join your build.

3
πŸ“¦ Include a tiny helper piece

Drop in a small empty file that helps the watcher learn the app's layout.

4
✍️ Set up your alert functions

Write short notes telling the watcher what to do, like printing library names when they load.

5
πŸš€ Turn it on at app start

Add one quick call early in your app to wake up the watcher and link your notes.

6
πŸ‘€ Run and watch magic happen

Launch your app and see friendly messages pop up showing exactly when each part activates.

βœ… Perfect insight gained

Now you always know when your app's pieces come alive, making debugging a breeze and your app stronger.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 10 to 10 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is dl_interceptor?

dl_interceptor is a C++ Android library that lets you hook into shared library loading with pre- and post-callbacks around ELF constructors and destructors. It fires right after a library is mapped and relocated but before its .init code runs, giving you precise control over dlopen events. Targets Android 5.0+ across all ABIs, integrating as a static lib, shared lib, or direct source in your android library project.

Why is it gaining traction?

Unlike hooking frameworks with heavy deps, it's self-contained with no external tools beyond basic symbol resolution, working on stock AOSP and vendor linkers like Samsung or Xiaomi without hardcoded offsets. Developers dig the simple C API for registering callbacks, plus CMake support for android github actions build and easy android_library_import. Runtime discovery keeps it future-proof across android library version changes.

Who should use this?

Android native engineers building security tools, anti-tampering solutions, or debuggers who need to inspect or block libs during load. Ideal for reverse engineers analyzing android github source code or hooking third-party modules in rooted apps. Suits teams using android github copilot for quick prototypes in Codespaces or apps with custom android library services.

Verdict

Grab it for niche native hooking needsβ€”solid docs and MIT license make experimentation low-risk, despite 10 stars and 1.0% credibility score signaling early maturity. Test thoroughly on your vendor ROMs before production; lacks extensive examples but punches above its weight for targeted use.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.