AndroidKnife / XposedDebugLinks
Android Debug Tools By Xposed!
☆22Updated 8 years ago
Alternatives and similar repositories for XposedDebug
Users that are interested in XposedDebug are comparing it to the libraries listed below
Sorting:
- ☆39Updated 10 years ago
- Native IO Redirect implementation for Android.☆75Updated 9 years ago
- Android 平台 加固方案☆40Updated 10 years ago
- A lightweight plug-in framework for Android.☆29Updated 7 years ago
- 使用cydia substrate框架hook android的关键api,实时记录观察app后台运行时所调用的所有敏感函数,并生成json日志输出☆70Updated 8 years ago
- 一个给apk加壳的工程☆15Updated 9 years ago
- zygote hook for art in android 6.0 and more☆52Updated 7 years ago
- Extract the part of JavaHook in the Xposed. Usage: Inject one process to load libtest.so, then enter the Java world and hook the java fun…☆23Updated 9 years ago
- POC of packing app(only dalvik supported)--Decrypt code on the fly☆51Updated 9 years ago
- ☆58Updated last year
- 基于YAHFA和dexposed 结合的hook框架 支持4.0-7.0☆88Updated 8 years ago
- 从oat文件中dump出来dex的工具☆140Updated 9 years ago
- 通过精简Smali语法细节来增强反编译代码阅读性,自定义了一种简单语法☆73Updated 8 years ago
- Parse classes.dex in APK file and get strings/methods/class info. no need unzip, no need decompile,☆20Updated 7 years ago
- Xposed Module Sample No Need To Reboot When Debug 不需要频繁重启调试的Xposed 模块源码例子☆21Updated 5 years ago
- Apk 加固项目(支持4.0-8.1,8.0+部分机型存在崩溃,持续跟进中)☆127Updated 7 years ago
- walk into Android security step by step☆102Updated 6 years ago
- 为Apk加壳项目,防止二次打包,代码反编译☆18Updated 10 years ago
- Inspector server for android☆47Updated last year
- android native工程反 调试例子☆45Updated 10 years ago
- Android application hooking tool based on VirtualHook/VirtualApp☆61Updated 8 years ago
- Native IO Redirect implementation for Android.☆27Updated 9 years ago
- ☆21Updated 9 years ago
- simple art inline hook☆36Updated 5 years ago
- Tool for reversing AAPT by remapping R.java values after decompilation/deobfuscation.☆32Updated 7 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆85Updated 9 years ago
- apimonitor ZjDroid是基于Xposed Framewrok的动态逆向分析模块,逆向分析者可以通过ZjDroid完成以下工作: DEX文件的内存dump 基于Dalvik关键指针的内存BackSmali,有效破解加固应用 敏感API的动态监控 指定内存区域数…☆56Updated 8 years ago
- xposed for ART☆15Updated 10 years ago
- 通过Xposed框架hook android的敏感函数,具体参考https://github.com/halfkiss/ZjDroid, 并添加了相应的函数☆72Updated 6 years ago
- DroidPlugin and Atlas practise samples to know them well☆14Updated 5 years ago