WindySha / XposedModuleSample
This is a xposed module showing how to hook java and native code.
☆11Updated 3 years ago
Alternatives and similar repositories for XposedModuleSample
Users that are interested in XposedModuleSample are comparing it to the libraries listed below
Sorting:
- Inotify监听测试☆34Updated 3 years ago
- apatch内核 模块用于隐藏mountxxx & maps & smaps的指定内容☆21Updated 2 months ago
- 修改app包名,实现随机包名,☆48Updated 2 years ago
- ☆12Updated 5 months ago
- inline hook tools☆21Updated 3 years ago
- learn the sandhook how to work☆22Updated last year
- android8 arm64 注入方案☆36Updated 3 years ago
- use xposed inject so☆17Updated 5 years ago
- Hook native with xposed☆17Updated 3 years ago
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆58Updated 5 months ago
- linux x86_64 and arm64 syscall hook☆20Updated last year
- Xposed 注释版本☆12Updated 5 years ago
- Zygisk module template.☆24Updated last year
- ☆17Updated 3 years ago
- ☆18Updated 3 years ago
- A Project for people to study android svc.☆25Updated 2 years ago
- Remap a library to avoid detection☆114Updated last year
- A kernel module for protecting android rooted device☆34Updated last year
- ☆20Updated 11 months ago
- A rootkit for Android.☆54Updated 11 months ago
- 转换Pxx的vmp文件(check.bin, mw.bin)到.class☆28Updated 2 years ago
- Android 进程级沙箱。☆18Updated 2 years ago
- APatch KernelPatch QEMU Debug Environment☆22Updated 8 months ago
- A c++ (jni) implementation of KeyAttestation for Android☆22Updated last year
- apatch内核模块 用于文件重定向☆46Updated last month
- 获取更详细的Java调用栈,即使清除调试信息并混淆也能知道那个方法报错☆16Updated 11 months ago
- https://github.com/5ec1cff/my-notes/blob/master/ptrace.md☆20Updated last year
- An AIDL interface scanning tool for Android source code.☆31Updated 10 months ago
- xposed 通用模板☆22Updated 3 years ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆69Updated 2 years ago