A Riru module trying to provide an ART hooking framework (initially for Android Pie) which delivers
consistent APIs with the OG Xposed, leveraging YAHFA (or SandHook) hooking framework.
SUPPORTED VERSIONS:
Android Oreo (8.x)
Android Pie (9.0)
HOW TO ISTALL:
Open Magisk app goto Download section.
Search for "Riru"
Install "Riru-core" and click back (don't click reboot after installation click back).
Now go to download section in Magisk again.
Search "Edxposed" (You'll get 2 options)
Install Edxposed (YAHFA).
Click Reboot when installed
Open Edxposed installer app
Go to download section and Search "Fake Mock Location"
Click on Fake Mock location >> Click versions
Install the latest version of Fake Mock Location (ver: 1.1 maybe)
After app is installed, enable it in EdXposed and Reboot device.
Open Fake mock location app and tick on top left corner (All apps)
Reboot one last time and start Spoofing (GPS setting Phone/ Device only preferred).
KNOWN ISSUES:
May not be compatible with all ART devices.
File access services are not implemented yet, now EdXp simply uses magiskpolicy to enable needed
SELinux policies.