riyadmondol2006 / Frida-Sign-Hook-Generator
☆10Updated 2 months ago
Alternatives and similar repositories for Frida-Sign-Hook-Generator:
Users that are interested in Frida-Sign-Hook-Generator are comparing it to the libraries listed below
- ☆14Updated 2 weeks ago
- Your APK Search Engine☆26Updated last month
- build frida for android arch : arm, arm64, x86 and x86_64☆11Updated this week
- Python tool to unpack/repackage Xamarin assembly store☆13Updated 3 months ago
- A demo app to detect Zygote injections☆66Updated last week
- Flutter Mobile Application Reverse Engineering Tool (Termux)☆74Updated this week
- Simple frida anti-detection patch☆35Updated last month
- Forked from codehasan/dex2c☆14Updated 2 months ago
- Forked from fbongtrop/hbctool☆52Updated last year
- Find JNI native methods while the app is running.☆18Updated 5 months ago
- Android Protection Bypass Stuff that I compiled from few resources.☆13Updated 2 years ago
- An Android Injector aimed to inject through Virtual Space without root permissions☆136Updated 2 months ago
- ☆16Updated 2 months ago
- A xposed module to bypass protectt.ai in Kotak Neo☆48Updated 5 months ago
- A header-only C++ library that makes working with the Java Native Interface (JNI) safer and more convenient.☆53Updated last week
- Android Dex保护工具 基于nmmp-vm项目简单修改☆19Updated 2 months ago
- Customized Frida build for bypassing basic detections and helping ajeossideul (guys) test mobile apps with Frida☆78Updated last month
- ☆49Updated last month
- A zygisk module that hooks `libdexfile.so` to dump dex☆69Updated 3 months ago
- A quick and dirty script to bypass SSL pinning of Flutter applications☆21Updated 9 months ago
- Inspect and instrument React Native applications at runtime☆56Updated 4 months ago
- dump dex from memory NEED ROOT☆57Updated last year
- Android memory editor app based on kernel☆17Updated 3 months ago
- A Frida Mod Menu for Android Games inspired by Android-Mod-Menu by LGLTeam☆50Updated last year
- 🔐 Run florida-server on boot with Magisk, always up-to-date(Set properties for frida-server to ensure usap is disabled)☆11Updated last week
- Small POC code that detects known root-related apps by attempting to launch their activities and monitoring security exception.☆19Updated last week
- A zygisk module that dumps so file from process memory☆52Updated 5 months ago
- Allows you to emulate Android native libraries, based on MicroDbg☆16Updated last month
- frida runtime resolves smali☆80Updated 4 months ago
- Remap a library to avoid detection☆103Updated last year