This is a library that can bypass the hidden api restriction on Android 9-12.

Overview

BypassHiddenApiRestriction

This is a library that can bypass the restrictions on non-SDK interfaces on Android 9-12.

How it works

另一种绕过Android 9以上非SDK接口调用限制的方法

Usage

1. Add dependency in build.gradle

allprojects {
    repositories {
        mavenCentral()
    }
}
dependencies {
    implementation 'io.github.windysha:bypassHiddenApiRestriction:1.0.2'
}

2. Add this code to your Application.attachBaseContext

import com.wind.hiddenapi.bypass.HiddenApiBypass

if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.P) {
    HiddenApiBypass.startBypass();
}

License

Copyright 2021 WindySha
Apache License, Version 2.0
http://www.apache.org/licenses/LICENSE-2.0
You might also like...
LMAO, its WinP4wn! A dead simple way to bypass company Group-Policies.

Win32.WinP4wn.dropper LMAO, its WinP4wn! A dead simple way to bypass a company Group-Policies. Abstract Win32.WinP4wn is a small dropper that uses an

Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.
Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.

Cobalt Strike BOF - Inject AMSI Bypass Cobalt Strike Beacon Object File (BOF) that bypasses AMSI in a remote process with code injection. Running inje

Automatically inject a DLL into the selected process with VAC3 bypass.
Automatically inject a DLL into the selected process with VAC3 bypass.

FTP LOADER Automatically inject a DLL into the selected process with VAC3 bypass. This will only, most likely, work only with source engine games in s

Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components

ByeIntegrity 8.0 The eighth Windows privilege escalation attack in the ByeIntegrity family. ByeIntegrity 8.0 is the most complex one I've created so f

Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving
Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving

Beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.exe" by using DCOM object.

bypass BeaconEye
bypass BeaconEye

bypass BeaconEye Hook_Sleep1 只适配了4.3的默认profile,作为demo测试食用,修改配置文件过后 这两处可能需要更改,自行调试 Hook_Sleep2 使用方式: 生成payload.bin - deal.py处理成result.bin - 重命名result

CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)
CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)

Cobalt Strike BOF - Inject ETW Bypass Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate) Running InjectEtwBypass BOF from Cobalt

A UAC bypass written in powershell

Powershell UAC bypass Originally discovered by Daniel Gebert Table of Contents Deployment Explanations What is UAC? DLL Hijacking Mock Directories Aut

osu!auth integrity check bypass

Note This is for research purposes only! I'm releasing this to help improve osu's anticheat solution. if you'd like to contact me, please do so on dis

Comments
  • Open failed on Miui 13

    Open failed on Miui 13

    在 MIUI 13 上解除限制失败,导致 App 停留在启动界面,日志如下,经小米云真机 小米 12 Pro 测试

    2022-02-08 16:35:21.044 9752-9752/com.annuochina.insurance.pre I/a.insurance.pr: Late-enabling -Xcheck:jni
    2022-02-08 16:35:21.113 9752-9752/com.annuochina.insurance.pre D/CompatibilityChangeReporter: Compat change id reported: 171979766; UID 10736; state: DISABLED
    2022-02-08 16:35:21.124 9752-9769/com.annuochina.insurance.pre D/AppScoutStateMachine: 9752-ScoutStateMachinecreated
    2022-02-08 16:35:21.128 9752-9752/com.annuochina.insurance.pre V/GraphicsEnvironment: ANGLE Developer option for 'com.annuochina.insurance.pre' set to: 'default'
    2022-02-08 16:35:21.128 9752-9752/com.annuochina.insurance.pre V/GraphicsEnvironment: Updatable production driver is not supported on the device.
    2022-02-08 16:35:21.130 9752-9752/com.annuochina.insurance.pre I/ForceDarkHelperStubImpl: initialize for com.annuochina.insurance.pre , ForceDarkOrigin
    2022-02-08 16:35:21.130 9752-9752/com.annuochina.insurance.pre D/OpenGLRenderer: JNI_OnLoad success
    2022-02-08 16:35:21.130 9752-9752/com.annuochina.insurance.pre I/MiuiForceDarkConfig: setConfig density:3.500000, mainRule:0, secondaryRule:0, tertiaryRule:0
    2022-02-08 16:35:21.131 9752-9752/com.annuochina.insurance.pre D/NetworkSecurityConfig: Using Network Security Config from resource network_security_config debugBuild: true
    2022-02-08 16:35:21.132 9752-9752/com.annuochina.insurance.pre D/NetworkSecurityConfig: Using Network Security Config from resource network_security_config debugBuild: true
    2022-02-08 16:35:21.134 9752-9752/com.annuochina.insurance.pre I/MultiDex: VM with version 2.1.0 has multidex support
    2022-02-08 16:35:21.134 9752-9752/com.annuochina.insurance.pre I/MultiDex: Installing application
    2022-02-08 16:35:21.134 9752-9752/com.annuochina.insurance.pre I/MultiDex: VM has multidex support, MultiDex support library is disabled.
    2022-02-08 16:35:21.136 9752-9752/com.annuochina.insurance.pre D/Bypass_DlFunctions: get elf base /apex/com.android.art/lib64/libnativebridge.so: 0x720511f000
    2022-02-08 16:35:21.136 9752-9752/com.annuochina.insurance.pre I/Bypass_DlFunctions: get trampoline_address_from_system_lib result : 0x7205121000 
    2022-02-08 16:35:23.626 9752-9772/com.annuochina.insurance.pre W/MIUIScout App: Enter APP_SCOUT_WARNING State
    2022-02-08 16:35:23.635 9752-9796/com.annuochina.insurance.pre W/MIUIScout App: Event:APP_SCOUT_WARNING Thread:main backtrace:
            at com.wind.hiddenapi.bypass.HiddenApiBypass.setHiddenApiExemptions(Native Method)
            at com.wind.hiddenapi.bypass.HiddenApiBypass.startBypass(HiddenApiBypass.java:12)
            at com.annuochina.insurance.App.attachBaseContext(App.kt:53)
            at android.app.Application.attach(Application.java:333)
            at android.app.Instrumentation.newApplication(Instrumentation.java:1178)
            at android.app.LoadedApk.makeApplication(LoadedApk.java:1369)
            at android.app.ActivityThread.handleBindApplication(ActivityThread.java:6896)
            at android.app.ActivityThread.access$1600(ActivityThread.java:264)
            at android.app.ActivityThread$H.handleMessage(ActivityThread.java:2103)
            at android.os.Handler.dispatchMessage(Handler.java:106)
            at android.os.Looper.loopOnce(Looper.java:210)
            at android.os.Looper.loop(Looper.java:299)
            at android.app.ActivityThread.main(ActivityThread.java:8088)
            at java.lang.reflect.Method.invoke(Native Method)
            at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:556)
            at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1045)
    2022-02-08 16:35:23.636 9752-9758/com.annuochina.insurance.pre I/a.insurance.pr: Thread[3,tid=9758,WaitingInMainSignalCatcherLoop,Thread*=0xb4000070622fdc50,peer=0x12e80ea8,"Signal Catcher"]: reacting to signal 3
    2022-02-08 16:35:23.636 9752-9758/com.annuochina.insurance.pre I/a.insurance.pr: 
    2022-02-08 16:35:23.657 9752-9758/com.annuochina.insurance.pre I/a.insurance.pr: Wrote stack traces to tombstoned
    2022-02-08 16:35:26.129 9752-9772/com.annuochina.insurance.pre W/MIUIScout App: Enter APP_SCOUT_HANG state
    2022-02-08 16:35:26.130 9752-9854/com.annuochina.insurance.pre W/MIUIScout App: Event:APP_SCOUT_HANG Thread:main backtrace:
            at com.wind.hiddenapi.bypass.HiddenApiBypass.setHiddenApiExemptions(Native Method)
            at com.wind.hiddenapi.bypass.HiddenApiBypass.startBypass(HiddenApiBypass.java:12)
            at com.annuochina.insurance.App.attachBaseContext(App.kt:53)
            at android.app.Application.attach(Application.java:333)
            at android.app.Instrumentation.newApplication(Instrumentation.java:1178)
            at android.app.LoadedApk.makeApplication(LoadedApk.java:1369)
            at android.app.ActivityThread.handleBindApplication(ActivityThread.java:6896)
            at android.app.ActivityThread.access$1600(ActivityThread.java:264)
            at android.app.ActivityThread$H.handleMessage(ActivityThread.java:2103)
            at android.os.Handler.dispatchMessage(Handler.java:106)
            at android.os.Looper.loopOnce(Looper.java:210)
            at android.os.Looper.loop(Looper.java:299)
            at android.app.ActivityThread.main(ActivityThread.java:8088)
            at java.lang.reflect.Method.invoke(Native Method)
            at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:556)
            at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1045)
    2022-02-08 16:35:26.134 9752-9758/com.annuochina.insurance.pre I/a.insurance.pr: Thread[3,tid=9758,WaitingInMainSignalCatcherLoop,Thread*=0xb4000070622fdc50,peer=0x12cc0ea8,"Signal Catcher"]: reacting to signal 3
    2022-02-08 16:35:26.134 9752-9758/com.annuochina.insurance.pre I/a.insurance.pr: 
    2022-02-08 16:35:26.151 9752-9758/com.annuochina.insurance.pre I/a.insurance.pr: Wrote stack traces to tombstoned
    
    opened by chinnsenn 4
Owner
Wind
Wind
ScriptHook Bypass For Fivem / bypass hardware ID For nvdia only

Fivem-Bypass ScriptHook Bypass For Fivem / bypass hardware ID For nvdia only Not Working? Run as admin and disable your antivirus. How to use 1. Put y

Sarnax 38 Dec 25, 2022
A Riru module tries to make Magisk more hidden.

Riru - MomoHider (aka IsolatedMagiskHider) Background Many applications now detect Magisk for security, Magisk provided "Magisk Hide" to hide the modi

残页 560 Dec 27, 2022
An embedded CAN bus sniffer which is able to monitor any of the vehicle internal CAN bus and perform some action by triggering new CAN messages.

An embedded CAN bus sniffer which is able to monitor any of the vehicle internal CAN bus and perform some action by triggering new CAN messages. In this way certain vehicle functionality can be triggered by responding to custom steering wheel button events, or use the vehicle virtual cockpit to display OBD-PIDs values instead of relying on an external display to present new information to the user

null 18 Dec 28, 2022
First open source android modding library for Geometry Dash Based on Hooking-and-Patching-android-template

Android-ML First open source android modding library for Geometry Dash Based on Hooking-and-Patching-android-template Installation Download this githu

BlackTea ML 21 Jul 17, 2022
A simple library that helps Android developers to execute JavaScript code from Android native side easily without using Webview.

AndroidJSModule A simple library that helps Android developers to execute JavaScript code from Android native side easily without using Webview. Insta

Hung Nguyen 5 May 24, 2022
This is a library that can fix the crash on android 5.0 and 5.1 caused by modified utf8 converting.

FixModifiedUtf8ConvertError This is a library that can fix the crash on android 5.0 and 5.1 caused by modified utf8 converting. What's this On Android

Windy 1 Nov 23, 2021
A customized LGL Android mod menu, containing ESP only for PUBG Mobile 1.3.0 for Android

PUBG Mobile ESP Mod Menu A customized LGL mod menu, containing ESP only for PUBG Mobile 1.3.0 for Android. Everything are fixed so it works with both

null 42 Mar 19, 2022
A repository for experimenting with elf loading and in-place patching of android native libraries on non-android operating systems.

droidports: A repository for experimenting with elf loading and in-place patching of android native libraries on non-android operating systems. Discla

João Henrique 26 Dec 15, 2022
Android NDK samples with Android Studio

NDK Samples This repository contains Android NDK samples with Android Studio C++ integration. These samples use the new CMake Android plugin with C++

Android 9.2k Dec 27, 2022
OffensivePH - use old Process Hacker driver to bypass several user-mode access controls

offensiveph OffensivePH is a post-exploitation tool that utilizes an old Process Hacker driver to bypass several user-mode access controls. Usage Comp

Red Section 291 Dec 29, 2022