mobile46 / TrustMeAlready
A Xposed Module to bypass SSL pinning.
☆47Updated last year
Alternatives and similar repositories for TrustMeAlready
Users that are interested in TrustMeAlready are comparing it to the libraries listed below
Sorting:
- frida-gadget injection tool based on xposed☆38Updated last year
- MagiskHide in Zygisk☆85Updated 2 years ago
- KernelSU for Google Pixel4XL☆121Updated 11 months ago
- ☆97Updated 9 months ago
- FunJni(JNITrace & hook ,So分析神器 )☆123Updated last year
- jshook uses imported related files in offline state download here☆78Updated 2 years ago
- SSLUnpinning☆82Updated 2 years ago
- 𝙎𝙎𝙇 𝙆𝙞𝙇𝙇𝙀𝙍☆72Updated last year
- 关于Magisk生态的研究☆135Updated last year
- 尝试复活blackdex☆29Updated 6 months ago
- A zygisk module that hooks `libdexfile.so` to dump dex☆73Updated 5 months ago
- FunELF(基于Xposed实现的SO脱壳机,用于还原内存中释放的SO文件。)☆54Updated last year
- JsHook脚本仓库☆89Updated last month
- FHook+: A dynamic instrumentation tool powered by Frida inject.☆116Updated last month
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.☆135Updated 2 months ago
- ☆162Updated 4 months ago
- ssl unpinning with zygisk☆38Updated last year
- Run a more undetectable frida server on boot using magisk 🔐✅☆221Updated this week
- Xposed Hook Android Intent/Scheme☆70Updated this week
- ☆210Updated 7 months ago
- HOOKUI,No Code, dyamic analaysis☆44Updated 4 months ago
- Example module☆72Updated last year
- A demo app to detect Zygote injections☆77Updated last month
- 这是一个 Magisk 模块,用于将自定义CA证书添加到系统信任存储区。支持安卓14。☆66Updated last year
- Simple frida anti-detection patch☆36Updated 2 months ago
- 启用 WebView 调试[旧](Enable WebView Debugging[old])☆21Updated 2 years ago
- Enable "adb install" for miui without login and sim☆70Updated last year
- A library for hiding and retrieving imports in ELF binaries.☆169Updated 3 weeks ago
- ☆117Updated last month
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆69Updated 2 years ago