Juxstin / Edxposed Snapchat Bypass
Licence: gpl-3.0
Elder driver Xposed Framework. W / Snapchat Bypass
Stars: ✭ 49
Programming Languages
java
68154 projects - #9 most used programming language
Projects that are alternatives of or similar to Edxposed Snapchat Bypass
Trustmealready
🔓 Disable SSL verification and pinning on Android, system-wide
Stars: ✭ 506 (+932.65%)
Mutual labels: xposed, bypass
Android Reports And Resources
A big list of Android Hackerone disclosed reports and other resources.
Stars: ✭ 590 (+1104.08%)
Mutual labels: bypass
Spookflare
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
Stars: ✭ 836 (+1606.12%)
Mutual labels: bypass
Snaptablayout
Android library for fluid tablayout animation as seen on Snapchat.
Stars: ✭ 547 (+1016.33%)
Mutual labels: snapchat
Locationreportenabler
A simple android app to enable Google Location Report, Google Now and related functions in China mainland or somewhere like.
Stars: ✭ 1,014 (+1969.39%)
Mutual labels: xposed
Xmedianotificationtrackselector
Xposed module for Android that allows you to select next track from the MediaStyle Notification
Stars: ✭ 20 (-59.18%)
Mutual labels: xposed
Stealing Ur Feelings
Winner of Mozilla's $50,000 prize for art and advocacy exploring AI
Stars: ✭ 784 (+1500%)
Mutual labels: snapchat
Snapchat Clone
👻 A SnapChat clone built with React, Redux and Typescript. Styled with SASS. Tested with Cypress, Jest and Enzyme. Linted with Eslint and formatted with Prettier!
Stars: ✭ 770 (+1471.43%)
Mutual labels: snapchat
Xposed
The native part of the Xposed framework (mainly the modified app_process binary).
Stars: ✭ 6,377 (+12914.29%)
Mutual labels: xposed
Ripv6
Random IPv6 - circumvents restrictive IP address-based filter and blocking rules
Stars: ✭ 10 (-79.59%)
Mutual labels: bypass
Sandvxposed
Xposed environment without root (OS 5.0 - 10.0)
Stars: ✭ 604 (+1132.65%)
Mutual labels: xposed
Snapchat Filter
3 facial filters on a webcam feed using OpenCV & ML - face swap, glasses and moustache
Stars: ✭ 35 (-28.57%)
Mutual labels: snapchat
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+12030.61%)
Mutual labels: bypass
Allaboutbugbounty
All about bug bounty (bypasses, payloads, and etc)
Stars: ✭ 758 (+1446.94%)
Mutual labels: bypass
Snapcode
👻 A simple command-line tool to download SnapChat codes.
Stars: ✭ 18 (-63.27%)
Mutual labels: snapchat
Shellphish
Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest
Stars: ✭ 1,037 (+2016.33%)
Mutual labels: snapchat
EdXposed-SnapChat-Bypass
A Riru module trying to provide a ART hooking framework (initially for Android Pie) which delivers consistent APIs with the OG Xposed, leveraging YAHFA (or SandHook) hooking framework.
w / anti sc bans
Supported versions
- Android Oreo (8.0, 8.1)
- Android Pie (9.0)
- Android Q (10.0)
For devices with Android 7.x and lower, original Xposed is strongly recommended.
Build requirements
Same as Riru-Core's and zip binaries can be downloaded from here.
Build
(NOTE JAVA JDK AND JRE 8 FROM ORACLE ARE NEEDED NO EXCEPTIONS)
CHECK Build requirements ABOVE
- Execute task
:edxp-core:[zip|push][Yahfa|Sandhook]Release
to build flashable zip for corresponding variant. (Example: gradlew :edxp-core:zipSandhookRelease) - Find the flashable under
edxp-core/release/
. - Flash the zip in recovery mode or via Magisk Manager.
Install
- Install Magisk v19.0+ (for latest EdXposed or Huawei devices, use our custom Magisk: Change Magisk update channel to this).
- Install Riru-Core v19+ from Magisk repo.
- Download EdXposed and install it in Magisk Manager or recovery mode.
- Install companion application.
- Reboot.
- Have fun! :)
Useful links
- List of Xposed Modules For Android Pie Working With EdXposed (thanks to Uraniam9 @ xda-developers)
Known issues
- May not be compatible with all ART devices.
- File access services are not implemented yet, now EdXp simply uses magiskpolicy to enable needed SELinux policies.
Sponsored
- JSnap discord: Join Discord
Get help
- GitHub issues (recommended): Issues
Contribute
- Apparently this framework is far from stable and all kinds of PRs are welcome. :)
- Buy me lunch if you like my bypass.
Credits
- YAHFA: the core ART hooking framework
- Magisk: makes all these possible
- Riru: provides a way to inject codes into zygote process
- XposedBridge: the OG xposed framework APIs
- dexmaker and dalvikdx: to dynamiclly generate YAHFA hooker classes
- Whale: used for inline hooking
- SandHook: ART hooking framework for SandHook variant
- Justin: Bypassing SC detection
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].