apkunpacker / RootAppDetectorLinks
Small POC code that detects known root-related apps by attempting to launch their activities and monitoring security exception.
☆26Updated 10 months ago
Alternatives and similar repositories for RootAppDetector
Users that are interested in RootAppDetector are comparing it to the libraries listed below
Sorting:
- Generic Frida Script To Bypass Root Detection☆56Updated 3 years ago
- ☆59Updated 11 months ago
- Small Apps As PoC to Detect Frida With Frida☆55Updated 3 years ago
- mobile reverse engineering framework☆78Updated last week
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Updated last year
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- Dalvik bytecode emulator for Android static analysis | String decryption | Multi-DEX | No Android runtime required☆78Updated last month
- Simple frida anti-detection patch☆54Updated 11 months ago
- A POC to detect zygisk☆70Updated 8 months ago
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆24Updated last week
- Toolset which makes possible hiddenly inject code in Android apps through system libraries☆73Updated 6 months ago
- Docker container to use blutter (dart decompiler for android apps)☆22Updated last year
- This repo will contain the material for reversing flutter applications.☆52Updated 6 months ago
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆106Updated 3 years ago
- ☆95Updated 3 years ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆47Updated last year
- A demo app to detect Zygote injections☆109Updated last week
- PoC of using android:name attribute for hooking☆20Updated 4 months ago
- Generate Frida hooks directly from JEB!☆90Updated 3 months ago
- Android Protection Bypass Stuff that I compiled from few resources.☆21Updated 3 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated this week
- frida runtime resolves smali☆92Updated 2 weeks ago
- ☆59Updated 2 years ago
- NEVER EVER DISABLE SELINUX!!!☆22Updated 2 years ago
- Getting better stacks and backtraces in Frida☆58Updated 2 months ago
- JADX-GUI plugin to get information about the native JNI (.so) libraries in an APK☆30Updated last month
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆69Updated last year
- Find JNI native methods while the app is running.☆21Updated last year
- A dynamic, Rust-based Zygisk module for hot-swapping native libraries into Android applications without rebooting. Designed for security …☆34Updated last month
- LSPosed module to prevent Santander UK app from detecting Zygisk implementations☆32Updated 8 months ago