Xposed | native part of the Xposed framework | iOS library
kandi X-RAY | Xposed Summary
kandi X-RAY | Xposed Summary
The native part of the Xposed framework (mainly the modified app_process binary).
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Xposed
Xposed Key Features
Xposed Examples and Code Snippets
Community Discussions
Trending Discussions on Xposed
QUESTION
I want to remove Google apps and services on a new Fairphone 4 (Android 11, now rooted using Magisk. No TWRP build available yet.).
To this end, I am trying to use microG. In the Prerequisites for its usage, signature spoofing and deleting files in system/priv-app
are listed. For signature spoofing, I followed the XPosed solution for Android 11 and 12 listed here, i.e. using Magisk + riru + LSPosed + a FakeGApps fork. Not sure, whether or not this worked. All individual steps reported success, but the Signature Spoofing Checker says it didn't work.
Anyway, I'm definitely stuck at the second step, because I don't seem to be able to delete any files in system_ext/priv-app
. I tried the solutions proposed here and here.
If I try
ANSWER
Answered 2021-Dec-27 at 18:12I asked the question simultaneously on the XDA Forums, and got a reply there.
At the stage described above (unlocked bootloader, Magisk, signature spoofing with riru + LSPosed), all that's needed is to install NanoDroid with microG as a Magisk module. Download the current NanoDroid-microG zip from here:
https://downloads.nanolx.org/NanoDroid/Stable/
either on your phone directly or transfer it to your phone, then install it as a Magisk module from storage. Voilà, GApps are removed (or at least inaccessible) and microG works. Best to then update microG, e.g. via its F-Droid repo: https://microg.org/download.html.
QUESTION
for example,i decompile the app and want to hook function with xposed,how can i do that?
...ANSWER
Answered 2021-Sep-17 at 15:43Have you tried to simply adapt the available examples to your class and method?
QUESTION
Some items doesn't display on iPad Air.
If you check this page: https://xposed-837fc.web.app/magazin-online
Under the "Profesionalism. Promptitudine. Perfectionare.", you shall find some projects with their images. But on iPad Air doesn't display.
I tested it on Chrome for all dimensions and they appear, even with the iPad Pro emulator, which has almost the same specs with the Air and it works. But on the iPad Air doesn't.
Do someone know why?
I can't find any logical explanation😅
iPad Air
iPar Pro Emulator from Chrome
Projects Map Component
...ANSWER
Answered 2021-Jul-15 at 18:13aspect-ratio
is not supported in your version of Safari for iOS. It will be available in Version 15.
You can use this padding trick in the interim.
QUESTION
I wanted to hook getInstalledApplications and getInstalledPackages to monitor if the app use this method to get my appliactionlist.
My code:
ANSWER
Answered 2021-Mar-16 at 09:02Both code versions have one major problem:
Your hook can not work because you are trying to hook a method that does not exist: You are trying to hook the method getInstalledApplications()
but that method does not exist, only the method [getInstalledApplications(int)][1]
does exist and can be hooked.
You alerady notived that android.content.pm.PackageManager
is an abstract class and the method getInstalledApplications(int)
is abstract, too. As Xposed can not hook abstract Methods and Interfaces you have to specify the class that that actually implements the method getInstalledApplications(int)
.
The actual implementation of PackageManager is located in class android.app.ApplicationPackageManager as you already found out.
Therefore the correct hooking code is:
QUESTION
So I'm Working on an Xposed module that should fit multiple apps, The purpose of the module is to create Automate the creation of A group of modules for different apps, What I need to know is, Is there a way to know All the methods that are called by a certain app during it's runTime like If I could make an Xposed module that would save the names of all the called methods in A database that would be a great help or If you have anything in mind regarding the automation of the Xposed modules please point me into that direction. Finally the app's purpose is to show the user the power consumption of each method in an app and show which use more power than others that's why I need to automate the process so I can create multiple modules for different apps without having to go through all the codes of the other apps.
...ANSWER
Answered 2021-Jan-06 at 08:24What you want to do is theoretically possible:
You can for example load the dex files of an app at run-time and examine every class and method and hook them. However this will have several significant drawbacks:
When hooking many functions in an app the execution is significantly slowed-down. Even on high-end device the users will not accept this. This will also increase the Android error messages about apps that are non-responsive because your Xposed module slows them down.
From my perspective the even worse problem is that the slow-down means of course that the CPU has much more work to do so that in the end you will drastically decrease the battery life by your Xposed module. So in the end your battery usage monitor app which uses the data governed by the Xposed module would have to show that more than 50% of the battery is consumed by Xposed and your module (just a raw estimation, can be up to 80%) because of the large number of hooked methods.
Method hooking is a technology that only works good if you just a few methods that are executed not very frequently.
Alternatively you can use it on special test devices for evaluating something (so it is not used on a regular device used every day). In this environment increased battery usage and slowed down apps are not very problematic.
QUESTION
On my ZTE Blade v8 Mini running Android 7.0 I installed Magisk, Xposed Framework for Magisk v89 and Xposed module Three Steps Ahead (missing in official repository). Rebooted my device and could see the module activated in Xposed Installer. When I launch the module either from within Xposed or as usual Android app it crashes endlessly. I installed Logcat Extreme and recorded the app's logs:
...ANSWER
Answered 2020-Aug-31 at 11:32We should use Context.MODE_PRIVATE and it will work!
QUESTION
I have a class MyObject
and an app which main activity implements a Method test(ArrayList x)
ANSWER
Answered 2020-Jun-13 at 10:37When developing hooks it is not a good idea to use the application source code as base. It is recommended to use the compiled APK file and decompile it using a tool like apktool. The reason for this is that the compiled code sometimes looks a bit different to what you expect:
The method parameter definition ArrayList
comprises of two sections:
- The object type
ArrayList
- A (generics) type parameter
MyObject
Generics were not part of the original Java definition and when this concept was later added it was restricted to the compiler. Therefore the generics type parameter only exists at compiler time in the method signature. In the app dex byte code and at rune-time you will only see the method test this way:
QUESTION
Im currently working with the xposed framework on Android 8.0. How is it possible to find all the method names of an app to hook? For example, i want to hook the method that is called if i add a new contact. Would it be possible to reverse engineer the apk to insert an logcat output into all methods, that shows which method was called?
...ANSWER
Answered 2020-Jun-12 at 14:00There a various methods for identifying the relevant methods.
The first and most important one is knowledge of the official Android API. All Java/Kotlin based apps at some point use the classes and methods defined i the API. And the most important fact is that because the Android API belongs to Android and not to the app it can not be obfuscated.
Second you can reverse engineer the app itself using tools like Jadx, apktool, Ghidra, JEB... Just make sure that the tool you use does not rename the class names (e.g. to avoid name collisions or make obfuscated class and method names better readable) or at least allows you always show you the original class and method name. Because trying to hook a method by it's name will fail if you use a name generated by the APK reversing tool.
Also a very helpful tool that allows to identify a lot o the internal on a running program is frida-trace
. As long the the executed app has no anti-debugging or anti-frida measures in place you can attach frida-trace at any time to an app on a rooted device and create execution traces you can later use to hook the methods using xposed or directly using frida.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install Xposed
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page