ggggmllll

Android library for intercepting Binder transactions and system calls via GOT hook and seccomp, enabling dynamic modification of IPC data and syscall behavior.

11
4
69% credibility
Found Mar 29, 2026 at 11 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
C++
AI Summary

A library for Android apps that intercepts and modifies internal communications with system services and system operations to aid in security research, privacy, and testing.

How It Works

1
🔍 Discover the tool

You hear about a handy kit for watching and tweaking how your Android app chats with phone system parts during security checks or privacy tweaks.

2
📱 Add to your app

You slip the kit into your Android project files so it's ready to use in your app.

3
🚀 Wake it up

In your app's startup spot, you turn on the watching feature with a simple call.

4
🛡️ Set your watch rules

You pick specific app-system talks or phone operations to monitor or change, like hiding if your app is for testing.

5
🧪 Run a quick test

You launch your app and trigger the chats or operations to see the magic in action.

6
Watch changes happen

Your rules kick in, quietly altering responses so the system sees what you want it to see.

Privacy secured

Your app now stays hidden from checks or behaves exactly as planned, keeping things safe and private.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 11 to 11 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is AndProxyDemo?

AndProxyDemo is a C++ Android library that intercepts Binder transactions and system calls, letting you dynamically modify IPC data and syscall results via simple Java callbacks. It tackles the hassle of low-level Android internals for security research, privacy tools, or automated testing—think altering app flags in IPackageManager responses or faking getpid returns without native protocol headaches. Integrate it as an android library module into your android library project for quick setup in android github actions build pipelines.

Why is it gaining traction?

Its dead-simple Java API abstracts Binder parsing and Seccomp notifications, so you register hooks by service/method names and tweak Parcels or registers effortlessly. Practical demos—like clearing debuggable flags or denying syscalls—make it a fast win for android github source code experiments or android github copilot prototypes, outshining verbose native alternatives. Niche appeal drives shares among reverse engineers despite modest stars.

Who should use this?

Android security researchers auditing IPC leaks, privacy devs crafting app shields, or QA engineers mocking syscalls in android library services tests. Suited for teams tweaking android library manifest data or building custom android github widget behaviors in controlled ARM64 setups.

Verdict

Worth forking into your github mirror android repo if ARM64/kernel 5.10+ fits—solid README examples and androidTest coverage punch above 11 stars (0.7% credibility). Early maturity means test thoroughly before android library plugin production use.

(187 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.