rarnu / xpjniLinks
☆19Updated 8 years ago
Alternatives and similar repositories for xpjni
Users that are interested in xpjni are comparing it to the libraries listed below
Sorting:
- demo for inject & hook in sandbox☆62Updated 6 years ago
- StormHook is a Android Hook Framework for Dalvik and Art☆117Updated 8 years ago
- 2份实现java hook的例子(看雪论坛的和ddi框架)☆43Updated 8 years ago
- ☆70Updated 7 years ago
- 隐藏关键方法的相关调用☆57Updated 8 years ago
- Android application hooking tool based on VirtualHook/VirtualApp☆63Updated 8 years ago
- 学习jni及反调试策略☆50Updated 7 years ago
- framenthook☆63Updated 6 years ago
- 参考支付宝代码☆45Updated 7 years ago
- xposedLuaHook☆68Updated 6 years ago
- ☆94Updated 7 years ago
- 利用android_inject和hookZz框架写的Android zygote注入andorid程序☆37Updated 6 years ago
- ☆35Updated 8 years ago
- 类太极☆34Updated 5 years ago
- 基于AccessibilityService(辅助功能)adb命令 一套Android自动化框架 在拥有ROOT情况下可以解决绝大多数情况 包括webview☆52Updated 5 years ago
- 安卓so内存加载劫持☆121Updated 8 years ago
- hook ime,进行键盘记录or输入控制,发挥你的想象.....☆39Updated 7 years ago
- 自研利用动态加载技术实现APK加壳,壳程序用JNI实现增加源码破解难度。☆97Updated 8 years ago
- Enhanced dlfunctions, look up symbol in both .dynsym and .symtab☆48Updated 6 years ago
- 修改Android lib***.so(ELF)文件的函数名和hash☆46Updated 8 years ago
- simple art inline hook☆36Updated 6 years ago
- Detect if device is an emulator by native code.{检查当运行的设备是否是模拟器.}☆46Updated 5 years ago
- 简易dex混淆器☆46Updated 10 years ago
- apimonitor ZjDroid是基于Xposed Framewrok的动态逆向分析模块,逆向分析者可以通过ZjDroid完成以下工作: DEX文件的内存dump 基于Dalvik关键指针的内存BackSmali,有效破解加固应用 敏感API的动态监控 指定内存区域数…☆56Updated 9 years ago
- Inspector server for android☆46Updated last year
- ☆26Updated 8 years ago
- 基于Xposed的极简易的dump dex文件脱壳工具☆54Updated 6 years ago
- Apk 加固项目(支持4.0-8.1,8.0+部分机型存在崩溃,持续跟进中)☆127Updated 7 years ago
- 解析Android中so文件格式☆90Updated 8 years ago
- 通过加载其他应用的 .dex 文件破解关键数据。☆25Updated 8 years ago