LSPosed / NativeDetectorLinks
Detect Zygote native injection like Riru and Zygisk
☆275Updated 3 years ago
Alternatives and similar repositories for NativeDetector
Users that are interested in NativeDetector are comparing it to the libraries listed below
Sorting:
- ☆83Updated 4 years ago
- ☆707Updated 2 years ago
- 隐秘空间/PrivacySpace☆210Updated last year
- Some Android environment detection examples☆294Updated 6 months ago
- ☆180Updated 7 months ago
- Module template of Riru.☆168Updated 3 years ago
- Modify framework.jar to build on system level a valid certificate chain☆346Updated 9 months ago
- The Meta Magic Mask for Android☆166Updated 4 months ago
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆194Updated 2 years ago
- Generate a valid certificate chain from scratch by injecting custom Keystore provider☆200Updated 10 months ago
- An android sample app of detecting suspicious apps like magisk manager☆623Updated 9 months ago
- ☆333Updated last year
- Using DirtyPipe to gain temporary root access for Android devices.☆275Updated 2 years ago
- XYN Xposed - The future from now on☆168Updated last year
- A third-party Xposed framework implementation which supports Android 5.0~14.☆850Updated last year
- A Riru module trying to make Magisk more hidden.☆710Updated 2 years ago
- Submit your Xposed Modules!☆78Updated last month
- An easy-to-use, high-performance dex deobfuscation library.☆624Updated last week
- Standalone implementation of Zygisk☆240Updated 11 months ago
- ☆160Updated 5 months ago
- Installer and manager for the Dreamland framework.☆110Updated 7 months ago
- 隐秘空间/PrivacySpace☆234Updated 3 years ago
- ☆109Updated last year
- A Xposed module for hiding Android developer-related switches status.☆281Updated this week
- ☆135Updated 4 months ago
- some APatch modules☆273Updated 2 weeks ago
- A library to make Xposed modules development easily.☆460Updated this week
- A Magisk/KernelSU/APatch module to modify framework.jar directly on the phone, to build a valid system-level certificate chain.☆341Updated 10 months ago
- Inject into processes specialized from Zygote☆270Updated last year
- ☆100Updated 9 months ago