darvincisec / DetectMagiskHideLinks
A way to detect magisk hide using an Android feature
☆221Updated 4 years ago
Alternatives and similar repositories for DetectMagiskHide
Users that are interested in DetectMagiskHide are comparing it to the libraries listed below
Sorting:
- Android VM injection and BinderJacking sample code, and some ramblings about root☆255Updated 6 years ago
- Anti-Debug and Anti-Memory Dump for Android☆281Updated 4 years ago
- PoC of injecting zygote processes by replacing system native bridge support☆162Updated 5 years ago
- A frida script implement XposedBridge & load xposed modules, without installing xposed framwork.☆211Updated 4 years ago
- Runs frida-server on boot as root with magisk.☆217Updated 2 years ago
- Run arbitrary code by patching OAT files☆100Updated 2 years ago
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆214Updated 2 years ago
- Inject frida agents on local processes through an Android app☆272Updated 4 years ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆62Updated 5 years ago
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.☆157Updated 3 months ago
- Module template of Riru.☆176Updated 4 years ago
- The axml components for reading binary Android XML files in Soot☆83Updated last year
- Is a protect Android App anti any attacks and environments.☆356Updated 2 years ago
- A virtualapp source code project by EA-Reopen.☆82Updated 3 years ago
- Android get/set system properties☆86Updated 4 years ago
- All-in-one android application protection☆254Updated 11 months ago
- Android library injection and function hooking, with CF.lumen's performance driver as example☆165Updated 3 years ago
- Generate dex file by c++☆198Updated last month
- This is a library that can load installed xposed modules and load xposed modules by file path. And native libraries in the xposed module…☆136Updated 2 years ago
- Bypass dynamic linking function restriction on Android by forging caller address☆40Updated 4 years ago
- Detect Frida for Android☆794Updated 4 years ago
- A couple of methods for detecting Frida on Android.☆493Updated 3 years ago
- Bypass APK Signatures Verify & Integrity Check using Reflection☆419Updated last year
- ☆63Updated 7 years ago
- Shared Library Injector on Android☆158Updated 5 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆197Updated last year
- ☆105Updated 4 years ago
- Detect Frida Android☆50Updated 4 years ago
- Sample project aimed to show how to download and compile llvm-obfuscator via CMake and use it to build Android native binaries, all by pr…☆36Updated 8 years ago
- A android app for encrypting apk☆195Updated 4 years ago