poorld / badgetLinks
frida-gadget injection tool based on xposed
☆45Updated last year
Alternatives and similar repositories for badget
Users that are interested in badget are comparing it to the libraries listed below
Sorting:
- 修改app包名,实现随机包名,☆51Updated 3 years ago
- FunELF(基于Xposed实现的SO脱壳机,用于还原内存中释放的SO文件。)☆56Updated 2 years ago
- Remap a library to avoid detection☆126Updated last year
- 个人专用 ONEPLUS 5 内核,做了一些基础的反调试修改(从 maps 隐藏特定 lib,最完整最正常的 tracerPid 修改措施)☆81Updated 3 years ago
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆72Updated 2 years ago
- LSPosed模块的两个利器:classmonitor和jnitrace☆179Updated last year
- ☆168Updated last month
- ☆48Updated 2 years ago
- Xposed免root注入so方案, 支持android各个版本☆215Updated last year
- Frida-Sigaction-Seccomp实现对Android APP系统调用的拦截☆119Updated last year
- 一个用于隐藏apatch root挂载文件特征的内核模块☆88Updated 5 months ago
- A zygisk module that hooks `libdexfile.so` to dump dex☆79Updated 8 months ago
- An application for detecting the runtime environment on the Android platform.☆141Updated 9 months ago
- A library for hiding and retrieving imports in ELF binaries.☆180Updated 3 months ago
- 检测app是否被frida/xposed注入☆52Updated 4 months ago
- 关于Magisk生态的研究☆151Updated last year
- ☆84Updated 3 months ago
- A demo app to detect Zygote injections☆89Updated 4 months ago
- 魔改sandhook特征,MikRom注入dex实现免root的xposed案例☆39Updated 3 years ago
- Simple PLT hook for Android☆105Updated 4 months ago
- ☆130Updated 3 weeks ago
- apatch内核模块用于隐藏mountxxx & maps & smaps的指定内容☆55Updated 5 months ago
- ☆35Updated 3 years ago
- 用于练手的环境检测的demo☆82Updated last year
- apatch内核模块 用于文件重定向☆60Updated 4 months ago
- FunJni(JNITrace & hook ,So分析神器 )☆127Updated last year
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.☆141Updated 4 months ago
- A zygisk module loads frida-gadget☆50Updated 10 months ago
- frida runtime resolves smali☆85Updated 2 months ago
- FunIl2cpp(il2cpp游戏dump&il2cpp方法调用跟踪)☆58Updated 2 years ago