MoonBirdLin / magisk-floridaLinks
🔐 Run florida-server on boot with Magisk, always up-to-date(Set properties for frida-server to ensure usap is disabled)
☆21Updated 2 months ago
Alternatives and similar repositories for magisk-florida
Users that are interested in magisk-florida are comparing it to the libraries listed below
Sorting:
- A demo app to detect Zygote injections☆90Updated this week
- A header-only C++ library that makes working with the Java Native Interface (JNI) safer and more convenient.☆81Updated 5 months ago
- A zygisk module that hooks `libdexfile.so` to dump dex☆80Updated 8 months ago
- An Android Injector aimed to inject through Virtual Space without root permissions☆159Updated 7 months ago
- Toolset which makes possible hiddenly inject code in Android apps through system libraries☆55Updated 3 weeks ago
- Simple frida anti-detection patch☆44Updated 5 months ago
- A zygisk module loads frida-gadget☆52Updated 10 months ago
- A library for hiding and retrieving imports in ELF binaries.☆181Updated 4 months ago
- A POC to detect zygisk☆61Updated 3 months ago
- Remap a library to avoid detection☆126Updated last year
- LSPosed module to prevent Santander UK app from detecting Zygisk implementations☆29Updated 2 months ago
- with this repo you can bypass libpairipcore tamper and signature protection☆41Updated 4 months ago
- a lightweight, multi-platform, multi-architecture hook framework.☆58Updated 2 months ago
- A zygisk module that dumps so file from process memory☆91Updated 10 months ago
- A Zygisk Module to dump il2cpp/unity games.☆26Updated 3 months ago
- 一个用于隐藏apatch root挂载文件特征的内核模块☆91Updated 6 months ago
- MagiskHide in Zygisk☆86Updated 3 years ago
- frida runtime resolves smali☆85Updated 3 months ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆72Updated 2 years ago
- dump dex from memory NEED ROOT☆61Updated last year
- A Xposed-like library for runtime Java method interception in OpenJDK VM.☆75Updated 3 months ago
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆119Updated last year
- android jni trace for arm64 for magisk module!☆73Updated 2 months ago
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.☆141Updated 5 months ago
- apatch内核模块用于隐藏mountxxx & maps & smaps的指定内容☆55Updated 6 months ago
- frida-gadget injection tool based on xposed☆45Updated last year
- vApp-Inject is a Virtual Box application project designed to provide users with the ability to run Android games and apps independently w…☆24Updated last year
- apatch内核模块 用于文件重定向☆61Updated 5 months ago
- A Frida script for hooking Android apps on arm/arm64 devices. It intercepts android_dlopen_ext, detects popular protectors (e.g., DexProt…☆26Updated 2 months ago
- A minimalistic Xposed framework which is based on LSPlant.☆34Updated 2 years ago