Riru | Inject into zygote process

 by   RikkaApps C++ Version: 26.0.0 License: No License

kandi X-RAY | Riru Summary

kandi X-RAY | Riru Summary

Riru is a C++ library. Riru has no bugs, it has no vulnerabilities and it has medium support. You can download it from GitHub.

Riru only does one thing, inject into zygote in order to allow modules to run their codes in apps or the system server. The name, Riru, comes from a character. (
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              Riru has a medium active ecosystem.
              It has 4452 star(s) with 511 fork(s). There are 181 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 1 open issues and 259 have been closed. On average issues are closed in 6 days. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of Riru is 26.0.0

            kandi-Quality Quality

              Riru has 0 bugs and 0 code smells.

            kandi-Security Security

              Riru has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              Riru code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              Riru does not have a standard license declared.
              Check the repository for any license declaration and review the terms closely.
              OutlinedDot
              Without a license, all rights are reserved, and you cannot use the library in your applications.

            kandi-Reuse Reuse

              Riru releases are available to install and integrate.
              Installation instructions are available. Examples and code snippets are not available.
              It has 1151 lines of code, 61 functions and 15 files.
              It has high code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Riru
            Get all kandi verified functions for this library.

            Riru Key Features

            No Key Features are available at this moment for Riru.

            Riru Examples and Code Snippets

            No Code Snippets are available at this moment for Riru.

            Community Discussions

            QUESTION

            Android 11, rooted (Magisk): mount system_ext in read/write to remove Google Apps
            Asked 2021-Dec-28 at 04:06

            I want to remove Google apps and services on a new Fairphone 4 (Android 11, now rooted using Magisk. No TWRP build available yet.).

            To this end, I am trying to use microG. In the Prerequisites for its usage, signature spoofing and deleting files in system/priv-app are listed. For signature spoofing, I followed the XPosed solution for Android 11 and 12 listed here, i.e. using Magisk + riru + LSPosed + a FakeGApps fork. Not sure, whether or not this worked. All individual steps reported success, but the Signature Spoofing Checker says it didn't work.

            Anyway, I'm definitely stuck at the second step, because I don't seem to be able to delete any files in system_ext/priv-app. I tried the solutions proposed here and here. If I try

            ...

            ANSWER

            Answered 2021-Dec-27 at 18:12

            I asked the question simultaneously on the XDA Forums, and got a reply there.

            At the stage described above (unlocked bootloader, Magisk, signature spoofing with riru + LSPosed), all that's needed is to install NanoDroid with microG as a Magisk module. Download the current NanoDroid-microG zip from here:

            https://downloads.nanolx.org/NanoDroid/Stable/

            either on your phone directly or transfer it to your phone, then install it as a Magisk module from storage. Voilà, GApps are removed (or at least inaccessible) and microG works. Best to then update microG, e.g. via its F-Droid repo: https://microg.org/download.html.

            Source https://stackoverflow.com/questions/70488382

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install Riru

            The Magisk version requirement is enforced by Magisk Manager. You can check Magisk's module installer script.
            From Magisk Manager Search "Riru" in Magisk Manager Install the module named "Riru" The Magisk version requirement is enforced by Magisk Manager. You can check Magisk's module installer script.
            Manually Download the zip from the GitHub release Install in Magisk Manager (Modules - Install from storage - Select downloaded zip)
            :riru:assembleDebug/Release Generate Magisk module zip to out.
            :riru:pushDebug/Release Push the zip with adb to /data/local/tmp.
            :riru:flashDebug/Release Flash the zip with adb shell su -c magisk --install-module.
            :riru:flashAndRebootDebug/Release Flash the zip and reboot the device.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            Install
            Maven
            Gradle
            CLONE
          • HTTPS

            https://github.com/RikkaApps/Riru.git

          • CLI

            gh repo clone RikkaApps/Riru

          • sshUrl

            git@github.com:RikkaApps/Riru.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link