FourTwooo / JumpReplay
Xposed Hook Android Intent/Scheme
☆49Updated last week
Alternatives and similar repositories for JumpReplay:
Users that are interested in JumpReplay are comparing it to the libraries listed below
- JsHook脚本仓库☆76Updated last week
- FunJni(JNITrace & hook ,So分析神器 )☆122Updated last year
- FunELF(基于Xposed实现的SO脱壳机,用于还原内存中释放的SO文件。)☆52Updated last year
- Xposed免root注入so方案, 支持android各个版本☆154Updated 10 months ago
- FunDex(基于Xposed实现的脱壳机,支持5-13,支持类抽取。)☆207Updated last year
- jshook uses imported related files in offline state download here☆64Updated 2 years ago
- LSPosed模块的两个利器:classmonitor和jnitrace☆152Updated 7 months ago
- 算法助手☆201Updated last year
- 劫持Zygote在App启动前注入so☆253Updated 5 months ago
- frida-gadget injection tool based on xposed☆35Updated last year
- movecert☆64Updated last year
- ☆338Updated this week
- frida自吐算法☆25Updated 2 years ago
- ☆139Updated 4 months ago
- FHook+: A dynamic instrumentation tool powered by Frida inject.☆109Updated 10 months ago
- ☆96Updated 2 years ago
- 启用 WebView 调试[旧](Enable WebView Debugging[old])☆21Updated 2 years ago
- An application for detecting the runtime environment on the Android platform.☆122Updated 4 months ago
- ☆71Updated 2 months ago
- 编译Pixel3上的KernelSU☆19Updated 9 months ago
- 这是一个 Magisk 模块,用于将自定义CA证书添加到系统信任存储区。支持安卓14。☆58Updated last year
- Run a more undetectable frida server on boot using magisk 🔐✅☆164Updated 3 weeks ago
- ☆77Updated 4 months ago
- ☆41Updated last year
- apatch kpm 模块通用内核读写内存 linux kernel read only support ARM64(based apatch)☆9Updated last month
- 个人逆向学习☆26Updated 7 months ago
- 一个自定义注入so的脚手架☆124Updated 3 months ago
- ☆31Updated 2 years ago
- ☆90Updated 6 months ago
- 基于YukiHookAPI的HookGG☆106Updated 3 weeks ago