ViRb3 / TrustMeAlreadyLinks
🔓 Disable SSL verification and pinning on Android, system-wide
☆1,415Updated 6 years ago
Alternatives and similar repositories for TrustMeAlready
Users that are interested in TrustMeAlready are comparing it to the libraries listed below
Sorting:
- movecert☆732Updated 2 years ago
- A Magisk/KernelSU module that automatically adds user certificates to the system root CA store☆2,218Updated 5 months ago
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆877Updated 9 years ago
- 支持Android7-15移动证书,兼容magiskv20.4+/kernelsu/APatch, Support Android7-15, compatible with magiskv20.4+/kernelsu/APatch☆1,507Updated 3 weeks ago
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,258Updated 3 weeks ago
- An xposed module that disables SSL certificate checking for the purposes of auditing an app with cert pinning☆5,189Updated last year
- Hide xposed, root, file redirection, etc.☆684Updated 4 years ago
- Enable WebView debugging and add vConsole in it. Support WebView, TBS X5, UC U4, Crosswalk(XWalk), XWeb. 启用 WebView 调试并添加 vConsole,支持 Web…☆606Updated 2 years ago
- Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)☆2,925Updated 5 years ago
- frida dump dex, frida dump so☆1,878Updated 3 months ago
- An anti detection version frida-server for android.☆1,506Updated 3 weeks ago
- Android certificate pinning disable tools☆1,456Updated 5 years ago
- 一键破解APK签名校验☆928Updated 8 years ago
- A frida tool to dump dex in memory to support security engineers analyzing malware.☆4,431Updated 2 years ago
- Frida 实现拦截okhttp的脚本☆1,119Updated 5 years ago
- Frida hook some jni functions☆1,631Updated last month
- Use Xposed force all webView to debug on android 4.4+☆608Updated 6 years ago
- 基于Frida的脱壳工具☆1,523Updated 5 months ago
- 曲境是一个xposed模块,可支持在PC浏览器上动态监控(hook)安卓APP的函数调用和查看堆栈信息,及反射调用(invoke)等功能。☆677Updated 2 years ago
- 基础反检测 frida-server / Basic anti-detection frida-server☆1,536Updated 3 weeks ago
- This is a tool to repackage apk file, then the apk can load any xposed modules installed in the device. It is another way to hook an app …☆2,948Updated last year
- ☆703Updated 5 years ago
- frida工具的缝合怪☆1,893Updated last year
- Example Frida agent written in TypeScript☆872Updated 2 months ago
- 🔨 Break Java Reverse Engineering form Memory World!☆864Updated 2 years ago
- ART环境下自动化脱壳方案☆2,603Updated 10 months ago
- A Xposed Module for Android Penetration Test, with NanoHttpd.☆788Updated 3 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,792Updated 2 years ago
- FridaContainer 整合了网上流行的和自己编写的常用的 frida 脚本,为逆向工作提效之用。 frida 脚本模块化,Java & Jni Trace。☆1,428Updated 2 weeks ago
- Install Magisk on Official Android Emulator☆751Updated 2 years ago