AsenOsen / android-framework-jar-patchingLinks
Toolset which makes possible hiddenly inject code in Android apps through system libraries
β71Updated 5 months ago
Alternatives and similar repositories for android-framework-jar-patching
Users that are interested in android-framework-jar-patching are comparing it to the libraries listed below
Sorting:
- Stealth patch for Frida, stealth knowledge collectionβ114Updated last year
- π Run florida-server on boot with Magisk, always up-to-date(Set properties for frida-server to ensure usap is disabled)β25Updated 6 months ago
- A library for hiding and retrieving imports in ELF binaries.β186Updated 8 months ago
- An Android Injector aimed to inject through Virtual Space without root permissionsβ178Updated 11 months ago
- A demo app to detect Zygote injectionsβ108Updated last month
- Simple frida anti-detection patchβ52Updated 10 months ago
- A Glimpse Into DexProtectorβ71Updated 2 weeks ago
- A header-only C++ library that makes working with the Java Native Interface (JNI) safer and more convenient.β102Updated 9 months ago
- Portable frida injector for rooted android devices.β206Updated 2 years ago
- LSPosed module to prevent Santander UK app from detecting Zygisk implementationsβ31Updated 7 months ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompiliβ¦β176Updated 11 months ago
- A Reversal and bypass for Appsealingβ85Updated last year
- You can bypass various Android security system checks such as Signature Verification, Integrity Check, etc. with this repo.β68Updated 3 years ago
- with this repo you can bypass libpairipcore tamper and signature protectionβ46Updated 8 months ago
- A Frida script for hooking Android apps on arm/arm64 devices. It intercepts android_dlopen_ext, detects popular protectors (e.g., DexProtβ¦β52Updated 3 months ago
- β59Updated 11 months ago
- β18Updated last year
- Non-authoritatively making Frida less (not un-!)detectable by applying some symptomatic patches. Melded with CrackerCat/strongR-frida-andβ¦β182Updated 3 weeks ago
- Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arbβ¦β203Updated last year
- PoC of using android:name attribute for hookingβ21Updated 3 months ago
- A POC to detect zygiskβ70Updated 7 months ago
- Let Your Ai Do Itβ27Updated 9 months ago
- A xposed module to bypass protectt.ai in Kotak Neoβ52Updated last year
- Code injection on Android without ptraceβ271Updated last year
- Android reverse-engineering tool / smali editorβ225Updated 3 months ago
- Android Protection Bypass Stuff that I compiled from few resources.β21Updated 3 years ago
- Forked from fbongtrop/hbctoolβ108Updated 2 years ago
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.β157Updated 2 months ago
- A Python script that dynamically attaches Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without rooβ¦β145Updated 3 weeks ago
- A zygisk module that hooks `libdexfile.so` to dump dexβ141Updated last month