WindySha / xposed-hook-based-on-whaleLinks
This is a xposed hook api based on whale.
☆25Updated 5 years ago
Alternatives and similar repositories for xposed-hook-based-on-whale
Users that are interested in xposed-hook-based-on-whale are comparing it to the libraries listed below
Sorting:
- 学习jni及反调试策略☆50Updated 7 years ago
- 基于四哥的 kstools 修改版本, 转化成了 as 工程,集成了 java2smali,hook 源码便于修改!☆26Updated 7 years ago
- .so文件加固☆28Updated 7 years ago
- ☆40Updated 5 years ago
- 安卓安全工具,包含jniECB、AES加解密,frida、xposed、root检测☆26Updated 4 years ago
- 描述☆54Updated 3 years ago
- Xposed版UETool插件☆42Updated 5 years ago
- Android JNI 监控指定目录下的文件以及子目录及子目录下的文件,支持传参控制要监听的事件,主要使用linux inotify和epoll实现☆37Updated 2 years ago
- getSharedPreferences的 MODE_WORLD_READABLE 在7.0以上会闪退,所以用contentprovider去替换。这里只提供出具体的两个实现类,根据自己的业务看着改吧。☆21Updated 4 years ago
- simple art inline hook☆35Updated 5 years ago
- 类太极☆34Updated 5 years ago
- demo for inject & hook in sandbox☆61Updated 6 years ago
- Detect if device is an emulator by native code.{检查当运行的设备是否是模拟器.}☆46Updated 5 years ago
- ☆93Updated 7 years ago
- 基于Smali文件 Android Studio 动态调试 APP☆37Updated 4 years ago
- An android binary formal xml parser.☆22Updated 2 years ago
- Android so加固☆48Updated 3 years ago
- ☆24Updated 5 years ago
- aapt和aapt2固定资源id,以及为资源进行public flag标记。☆18Updated 3 years ago
- jni加密解密,jni签名检测,jni模拟器检测,jni-xpose框架检测,jni-root机器检测☆40Updated this week
- DexShell Practice☆30Updated last year
- 基于Frida的 脱壳工具☆12Updated 6 years ago
- 基于Xposed的极简易的dump dex文件脱壳工具☆52Updated 6 years ago
- 使用Lua写Xposed功能☆34Updated 2 years ago
- HookwormForAndroid实战示例☆32Updated 4 years ago
- F5Web Xposed插件,利用WebView和Chromium的伪协议或注入方法使所有WebView和部分Chromium可以注入自定义的Js脚本☆32Updated 5 years ago
- 2份实现java hook的例子(看雪论坛的和ddi框架)☆43Updated 8 years ago
- Android Apk 加固之Dex文件 完善篇 InMemoryDexClassLoader 之内存加载dex DexShell☆24Updated 5 years ago
- 能自动实现Apk加固的Gradle插件☆32Updated 7 years ago
- Android JNI接口混淆方案☆29Updated 5 years ago