FourTwooo / JumpReplay
Xposed Hook Android Intent/Scheme
☆56Updated last week
Alternatives and similar repositories for JumpReplay:
Users that are interested in JumpReplay are comparing it to the libraries listed below
- JsHook脚本仓库☆82Updated last week
- FunJni(JNITrace & hook ,So分析神器 )☆123Updated last year
- FunDex(基于Xposed实现的脱壳机,支持5-13,支持类抽取。)☆212Updated last year
- FunELF(基于Xposed实现的SO脱壳机,用于还原内存中释放的SO文件。)☆53Updated last year
- Xposed免root注入so方案, 支持android各个版本☆182Updated 11 months ago
- LSPosed模块的两个利器:classmonitor和jnitrace☆160Updated 8 months ago
- jshook uses imported related files in offline state download here☆69Updated 2 years ago
- 算法助手☆206Updated last year
- A zygisk module that hooks `libdexfile.so` to dump dex☆68Updated 3 months ago
- frida-gadget injection tool based on xposed☆36Updated last year
- ☆42Updated 2 years ago
- ☆73Updated 3 months ago
- 一个用于隐藏apatch root挂载文件特征的内核模块☆27Updated last month
- movecert☆66Updated last year
- ☆353Updated this week
- 劫持Zygote在App启动前注入so☆272Updated 6 months ago
- FHook+: A dynamic instrumentation tool powered by Frida inject.☆114Updated 3 weeks ago
- apatch kpm 模块通用内核读写内存 linux kernel read only support ARM64(based apatch)☆14Updated 3 weeks ago
- ☆100Updated 2 years ago
- 编译Pixel3上的KernelSU☆19Updated 10 months ago
- ☆144Updated 4 months ago
- A Xposed Project Builder by YukiHookAPI.☆65Updated 2 months ago
- frida自吐算法☆25Updated 2 years ago
- frida dump android elf, support spawn and attach mode☆74Updated last year
- 启用 WebView 调试[旧](Enable WebView Debugging[old])☆21Updated 2 years ago
- Run a more undetectable frida server on boot using magisk 🔐✅☆187Updated last week
- An application for detecting the runtime environment on the Android platform.☆127Updated 5 months ago
- ☆95Updated 7 months ago
- 基于YukiHookAPI的HookGG☆108Updated last month
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆101Updated last year