TheCjw / XposedModulesLinks
Some xposed modules
☆15Updated 6 years ago
Alternatives and similar repositories for XposedModules
Users that are interested in XposedModules are comparing it to the libraries listed below
Sorting:
- Start method tracing using Android's internal APIs☆13Updated 7 years ago
- ☆21Updated 9 years ago
- 娜迦DEX文件修复程序☆25Updated 7 years ago
- ☆17Updated 6 years ago
- JEB Scripts☆21Updated 10 years ago
- JNI Helper Plugin☆53Updated 6 months ago
- exploit for cve-2014-7911; android; java deserialization ;system privilege;ace;☆13Updated 9 years ago
- A demo to show how to install Xposed and enable Xposed based module automatically☆29Updated 10 years ago
- Various Jeb plugins, including obfuscation restore☆15Updated 10 years ago
- Parse and tamper DEX file☆18Updated 8 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- ☆22Updated 6 years ago
- jar Signature / APK Signature v2 verify with pure python (support rsa dsa ecdsa)☆30Updated 5 years ago
- ☆11Updated 6 years ago
- PoC binary file of FakeID,with some source code☆47Updated 10 years ago
- A tool to log method's parameters and return value.☆33Updated 10 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Updated 11 years ago
- ☆41Updated 8 years ago
- ☆24Updated 8 years ago
- This project provide a plan of Android App Hook. It can do the hook work both in Java and NDK.☆14Updated 5 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- android hide root demo, code from Magisk☆20Updated 6 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆14Updated 6 years ago
- mtkfb exploit for mt658x & mt6592☆35Updated 9 years ago
- An android hook tools based on cydia substrate☆26Updated 9 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- modify field(modWhen, crc) in android odex file;安卓APP“寄生兽”漏洞☆14Updated 9 years ago
- CVE-2013-2597 exploit☆12Updated 11 years ago
- ☆22Updated 6 years ago