darvincisec / InjectFridaGadgetLinks
Script to inject frida gadget into APK
☆34Updated 4 years ago
Alternatives and similar repositories for InjectFridaGadget
Users that are interested in InjectFridaGadget are comparing it to the libraries listed below
Sorting:
- Use LD-Preload to Inject a shared library on any android version and architecture☆55Updated last year
- Simple frida anti-detection patch☆36Updated 3 months ago
- Utilities to help injecting libraries and frida in apks.☆24Updated last year
- Dynamic Process name change for Android Apps☆28Updated 4 years ago
- ☆28Updated 7 years ago
- Decrypt String in classes.dex without decompile☆27Updated 4 years ago
- Android library for detecting Android virtual containers.☆69Updated 4 years ago
- Promon Shield String Deobfuscator☆35Updated last month
- 🔐 Run florida-server on boot with Magisk, always up-to-date(Set properties for frida-server to ensure usap is disabled)☆18Updated last week
- Update Frida hooks automatically.☆27Updated last year
- 1337C001's Memory Dumper☆29Updated 5 years ago
- Inject so & apk to zygote on android. Support armv8 & armv7.☆62Updated 6 years ago
- Get MagiskHide to work again on Magisk v23☆17Updated 3 years ago
- An offline documentation browser for Smali☆16Updated 5 years ago
- A minimalistic Xposed framework which is based on LSPlant.☆32Updated 2 years ago
- Magisk Module with strace☆30Updated 4 years ago
- A Reversal and bypass for Appsealing☆67Updated 8 months ago
- http://forum.xda-developers.com/xposed/modules/mod-advanced-logging-t3472533☆24Updated 5 years ago
- You can bypass various Android security system checks such as Signature Verification, Integrity Check, etc. with this repo.☆62Updated 2 years ago
- encryption for mobile android applications☆43Updated 6 years ago
- This demo project is the code a tutorial on how to hacking an Android games using Frida☆18Updated 2 years ago
- ☆30Updated 2 years ago
- Remap a library to avoid detection☆117Updated last year
- Inject ARM-64 is designed to facilitate the injection of cheats into ARM-64/ARM-32 architecture devices without the need for root access.…☆58Updated 6 months ago
- ☆50Updated 3 years ago
- ☆31Updated 3 years ago
- Dump Memory Segment From Process Memory and Rebuild ELF So Binaries☆27Updated 4 years ago
- A frida module to parse Elf headers in runtime☆35Updated 5 years ago
- Reverse Engineering about 360 android app guard☆58Updated 5 years ago
- Simple example of jadx plugin☆21Updated 2 months ago