FourTwooo / JumpReplay
Xposed Hook Android Intent/Scheme
☆45Updated last week
Alternatives and similar repositories for JumpReplay:
Users that are interested in JumpReplay are comparing it to the libraries listed below
- JsHook脚本仓库☆70Updated this week
- FunJni(JNITrace & hook ,So分析神器 )☆122Updated last year
- FunDex(基于Xposed实现的脱壳机,支持5-13,支持类抽取。)☆197Updated last year
- FunELF(基于Xposed实现的SO脱壳机,用于还原内存中释放的SO文件。)☆51Updated last year
- LSPosed模块的两个利器:classmonitor和jnitrace☆150Updated 6 months ago
- Xposed免root注入so方案, 支持android各个版本☆139Updated 8 months ago
- jshook uses imported related files in offline state download here☆62Updated 2 years ago
- frida-gadget injection tool based on xposed☆34Updated last year
- 算法助手☆194Updated last year
- 劫持Zygote在App启动前注入so☆247Updated 4 months ago
- ☆92Updated 2 years ago
- ☆333Updated this week
- frida自吐算法☆24Updated 2 years ago
- movecert☆65Updated last year
- ☆70Updated last month
- ☆69Updated 3 months ago
- ☆136Updated 2 months ago
- 这是一个 Magisk 模块,用于将自定义CA证书添加到系统信任存储区。支持安卓14。☆54Updated 11 months ago
- ☆147Updated 2 months ago
- An application for detecting the runtime environment on the Android platform.☆116Updated 2 months ago
- 𝙎𝙎𝙇 𝙆𝙞𝙇𝙇𝙀𝙍☆63Updated 8 months ago
- FHook+: A dynamic instrumentation tool powered by Frida inject.☆107Updated 9 months ago
- 启用 WebView 调试[旧](Enable WebView Debugging[old])☆21Updated 2 years ago
- Dex to Java decompiler☆60Updated 2 weeks ago
- frida dump android elf, support spawn and attach mode☆70Updated 9 months ago
- ☆40Updated last year
- Run a more undetectable frida-server on boot using magisk 🔐✅☆151Updated last month
- ArmPro注入器的服务器端源代码,使用ieda编译为jar文件即可使用它到你的服务器。☆16Updated 6 months ago
- 一个自定义注入so的脚手架☆108Updated 2 months ago
- Generate Frida Script☆97Updated last year