Detected by Check Point researchers, VoidLink is a sophisticated malware framework that can be used to implant malware in the ...
If you would like to suggest a new feature, please do so in Discussions. Please do not create an Issue for feature suggetsions (they will be moved to Discussions). If you have an issue please post a ...
Abstract: Kernel-mode security enhancement technologies are widely used to improve the efficiency of data processing and the security of data and operating systems in recent years. However, the ...
Bypass Root Check Pro Xposed Module with Java and Native (C/C++) Hooks based on Modern Xposed API by LSPosed. This module bypasses root checks the pro way. This module not only hooks Java logic, but ...