andyacer / movecertLinks
movecert
☆46Updated last month
Alternatives and similar repositories for movecert
Users that are interested in movecert are comparing it to the libraries listed below
Sorting:
- A Xposed Module to bypass SSL pinning.☆62Updated last year
- KernelSU for Google Pixel4XL☆129Updated last year
- Run a more undetectable frida server on boot using magisk 🔐✅☆266Updated 3 weeks ago
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆207Updated 2 years ago
- SSLUnpinning☆86Updated 2 years ago
- ☆246Updated 11 months ago
- ☆374Updated 5 months ago
- toggle app debuggable☆358Updated 8 months ago
- ☆113Updated last year
- FunJni(JNITrace & hook ,So分析神器 )☆128Updated 2 years ago
- A dynamic dex dumper, implemented in rust, no frida.☆143Updated 2 years ago
- 关于Magisk生态的研究☆154Updated last year
- https://5ec1cff.github.io/my-blog☆325Updated last year
- 𝙎𝙎𝙇 𝙆𝙞𝙇𝙇𝙀𝙍☆80Updated last year
- Non-authoritatively making Frida less (not un-!)detectable by applying some symptomatic patches. Melded with CrackerCat/strongR-frida-and…☆142Updated this week
- DexDumper based eBPF on Android Platform☆228Updated 3 weeks ago
- FunELF(基于Xposed实现的SO脱壳机,用于还原内存中释放的SO文件。)☆57Updated 2 years ago
- movecert☆70Updated last year
- movecert☆29Updated 3 years ago
- ☆104Updated last year
- ☆65Updated last week
- A Magisk module that moves certificates from the user certificate store to the system certificate store.☆50Updated 2 years ago
- frida-gadget injection tool based on xposed☆45Updated 2 years ago
- ☆167Updated 8 months ago
- ☆117Updated 2 years ago
- modified HarmonyOS Next emulator,with root permission☆130Updated 10 months ago
- Simple frida anti-detection patch☆45Updated 6 months ago
- A dex analyzer for finding obfuscated codes dynamically☆101Updated last year
- ☆163Updated 10 months ago
- LSPosed模块的两个利器:classmonitor和jnitrace☆183Updated last year