zhouziyang / libndk_translationLinks
☆51Updated 2 years ago
Alternatives and similar repositories for libndk_translation
Users that are interested in libndk_translation are comparing it to the libraries listed below
Sorting:
- redroid kernel modules (binderfs, ashmem etc.)☆96Updated 3 years ago
- 给Android11 x86_64 安装libhoudini arm兼容层,提取自Windows Subsystem for Android™️ (WSA)。A Gearlock package for install libhoudini translation on x…☆166Updated last year
- Simple PLT hook for Android☆109Updated 7 months ago
- Precompiled tcpdump binaries for Android☆58Updated 4 years ago
- 🔐 Run hluda-server on boot with Magisk, always up-to-date☆11Updated last year
- A collection of android DTB(Dynamic Binary Translator) implementations pulled from Chromebook CrosVM software and Windows Subsystem For A…☆70Updated last year
- PoC of injecting zygote processes by replacing system native bridge support☆160Updated 4 years ago
- Magisk Module with strace☆35Updated 5 years ago
- ☆99Updated 2 years ago
- cdex to dex binarys☆41Updated 7 years ago
- ☆36Updated 2 months ago
- aosp sources without prebuilts☆16Updated last year
- vscode extension which allows you to decompile a single smali file into java code☆57Updated 2 years ago
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆210Updated 2 years ago
- 移除所有的git子模块。他通过脚本的方式保证和LSPosed官方代码一致,但是无法同步commit记录。这么做的目的是为了方便对LSPosed深度二开,这是因为跨git module的修改无法良好的使用git合并和diff,这样容易和官方代码分支脱离☆20Updated last year
- patch ext☆19Updated last year
- 关于Magisk生态的研究☆154Updated last year
- 个人专用 ONEPLUS 5 内核,做了一些基础的反调试修改(从 maps 隐藏特定 lib,最完整最正常的 tracerPid 修改措施)☆81Updated 4 years ago
- Simple frida anti-detection patch☆49Updated 8 months ago
- Run command with specific selinux context for Android☆28Updated 3 years ago
- frida-gadget injection tool based on xposed☆45Updated 2 years ago
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.☆150Updated 2 weeks ago
- A dex analyzer for finding obfuscated codes dynamically☆100Updated last year
- PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from…☆165Updated last year
- KernelSU modified for debugging☆33Updated 2 years ago
- ☆115Updated 3 years ago
- Find JNI native methods while the app is running.☆20Updated last year
- NEVER EVER DISABLE SELINUX!!!☆21Updated last year
- An adbd extension used for adb root and shell replacement.☆54Updated last month
- redroid manifests☆18Updated 2 years ago