All Projects → Juxstin → Edxposed Snapchat Bypass

Juxstin / Edxposed Snapchat Bypass

Licence: gpl-3.0
Elder driver Xposed Framework. W / Snapchat Bypass

Programming Languages

java
68154 projects - #9 most used programming language

Projects that are alternatives of or similar to Edxposed Snapchat Bypass

Trustmealready
🔓 Disable SSL verification and pinning on Android, system-wide
Stars: ✭ 506 (+932.65%)
Mutual labels:  xposed, bypass
Nsudo
Series of System Administration Tools
Stars: ✭ 945 (+1828.57%)
Mutual labels:  bypass
Android Reports And Resources
A big list of Android Hackerone disclosed reports and other resources.
Stars: ✭ 590 (+1104.08%)
Mutual labels:  bypass
Spookflare
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
Stars: ✭ 836 (+1606.12%)
Mutual labels:  bypass
Hardwarecode
基于xposed 修改硬件信息
Stars: ✭ 635 (+1195.92%)
Mutual labels:  xposed
Mdwechat
一个能让微信 Material Design 化的 Xposed 模块
Stars: ✭ 849 (+1632.65%)
Mutual labels:  xposed
Snaptablayout
Android library for fluid tablayout animation as seen on Snapchat.
Stars: ✭ 547 (+1016.33%)
Mutual labels:  snapchat
Locationreportenabler
A simple android app to enable Google Location Report, Google Now and related functions in China mainland or somewhere like.
Stars: ✭ 1,014 (+1969.39%)
Mutual labels:  xposed
Xmedianotificationtrackselector
Xposed module for Android that allows you to select next track from the MediaStyle Notification
Stars: ✭ 20 (-59.18%)
Mutual labels:  xposed
Stealing Ur Feelings
Winner of Mozilla's $50,000 prize for art and advocacy exploring AI
Stars: ✭ 784 (+1500%)
Mutual labels:  snapchat
Snapchat Clone
👻 A SnapChat clone built with React, Redux and Typescript. Styled with SASS. Tested with Cypress, Jest and Enzyme. Linted with Eslint and formatted with Prettier!
Stars: ✭ 770 (+1471.43%)
Mutual labels:  snapchat
Xposed
The native part of the Xposed framework (mainly the modified app_process binary).
Stars: ✭ 6,377 (+12914.29%)
Mutual labels:  xposed
Ripv6
Random IPv6 - circumvents restrictive IP address-based filter and blocking rules
Stars: ✭ 10 (-79.59%)
Mutual labels:  bypass
Sandvxposed
Xposed environment without root (OS 5.0 - 10.0)
Stars: ✭ 604 (+1132.65%)
Mutual labels:  xposed
Snapchat Filter
3 facial filters on a webcam feed using OpenCV & ML - face swap, glasses and moustache
Stars: ✭ 35 (-28.57%)
Mutual labels:  snapchat
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+12030.61%)
Mutual labels:  bypass
Allaboutbugbounty
All about bug bounty (bypasses, payloads, and etc)
Stars: ✭ 758 (+1446.94%)
Mutual labels:  bypass
Snapcode
👻 A simple command-line tool to download SnapChat codes.
Stars: ✭ 18 (-63.27%)
Mutual labels:  snapchat
Shellphish
Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest
Stars: ✭ 1,037 (+2016.33%)
Mutual labels:  snapchat
Xposednavigationbar
Xposed导航栏功能拓展模块
Stars: ✭ 42 (-14.29%)
Mutual labels:  xposed

EdXposed-SnapChat-Bypass

BTC

A Riru module trying to provide a ART hooking framework (initially for Android Pie) which delivers consistent APIs with the OG Xposed, leveraging YAHFA (or SandHook) hooking framework.

w / anti sc bans

Supported versions

  • Android Oreo (8.0, 8.1)
  • Android Pie (9.0)
  • Android Q (10.0)

For devices with Android 7.x and lower, original Xposed is strongly recommended.

Build requirements

Same as Riru-Core's and zip binaries can be downloaded from here.

Build

(NOTE JAVA JDK AND JRE 8 FROM ORACLE ARE NEEDED NO EXCEPTIONS)

CHECK Build requirements ABOVE

  1. Execute task :edxp-core:[zip|push][Yahfa|Sandhook]Release to build flashable zip for corresponding variant. (Example: gradlew :edxp-core:zipSandhookRelease)
  2. Find the flashable under edxp-core/release/.
  3. Flash the zip in recovery mode or via Magisk Manager.

Install

  1. Install Magisk v19.0+ (for latest EdXposed or Huawei devices, use our custom Magisk: Change Magisk update channel to this).
  2. Install Riru-Core v19+ from Magisk repo.
  3. Download EdXposed and install it in Magisk Manager or recovery mode.
  4. Install companion application.
  5. Reboot.
  6. Have fun! :)

Useful links

Known issues

  • May not be compatible with all ART devices.
  • File access services are not implemented yet, now EdXp simply uses magiskpolicy to enable needed SELinux policies.

Sponsored

Get help

  • GitHub issues (recommended): Issues

Contribute

  • Apparently this framework is far from stable and all kinds of PRs are welcome. :)
  • Buy me lunch if you like my bypass.

Credits

  • YAHFA: the core ART hooking framework
  • Magisk: makes all these possible
  • Riru: provides a way to inject codes into zygote process
  • XposedBridge: the OG xposed framework APIs
  • dexmaker and dalvikdx: to dynamiclly generate YAHFA hooker classes
  • Whale: used for inline hooking
  • SandHook: ART hooking framework for SandHook variant
  • Justin: Bypassing SC detection

BTC

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].