WindySha / EasyBypassRestrictions
This is a project that can bypass the android hidden api restictrion and bypass dlfcn restriction for system lib.
☆23Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for EasyBypassRestrictions
- android hide root demo, code from Magisk☆19Updated 6 years ago
- search all symbal in ELF file(dlsym can not find)☆27Updated 5 years ago
- A c++ (jni) implementation of KeyAttestation for Android☆18Updated 9 months ago
- 👴的毕设,打算从native层到java层的hook都搞一遍,最终目标是能支持hook用户apk的东西☆24Updated 2 years ago
- ☆25Updated 2 years ago
- Deploy your own AOSPXRef☆20Updated last week
- This is an injection tool that can inject xposed module to debuggable app by jdwp.☆47Updated 2 years ago
- inline hook tools☆17Updated 3 years ago
- NEVER EVER DISABLE SELINUX!!!☆22Updated 9 months ago
- Slim dockerized Android ndk☆10Updated last year
- Hack Android Runtime (ART) using chickenhook☆23Updated 4 years ago
- Load dex on ART in interpret mode☆17Updated 5 years ago
- libapp.so分析助手☆16Updated last year
- ☆18Updated 2 years ago
- A simple cli tool to monitor the file opening of application processes.☆30Updated 2 years ago
- A high performance dex deobfuscator library.☆46Updated 2 years ago
- Trace jni calls with eBPF on Android☆24Updated 2 years ago
- Android-Syscall-Logger☆19Updated 3 years ago
- Getting better stacks and backtraces in Frida☆33Updated 5 months ago
- A Project for people to study android svc.☆24Updated 2 years ago
- Hook native with xposed☆16Updated 2 years ago
- Bypass dynamic linking function restriction on Android by forging caller address☆35Updated 2 years ago
- 来自大表哥的剑☆22Updated 5 years ago
- ☆15Updated 3 years ago
- Reverse Engineering about 360 android app guard☆57Updated 4 years ago
- ☆50Updated 5 months ago
- Frida module utils, writen in typescript☆16Updated 9 months ago
- Simple Android ARM&ARM64 GOT Hook☆34Updated 2 years ago
- An Xposed plugin loader without rebooting the phone☆3Updated 2 years ago
- Android eBPF sample☆45Updated 2 years ago