MehmetEfeFriday / FRIDA-ART-FIXLinks
BUILT VERSION OF FRIDA FOR THE FRIDA ART ISSUE
☆16Updated last year
Alternatives and similar repositories for FRIDA-ART-FIX
Users that are interested in FRIDA-ART-FIX are comparing it to the libraries listed below
Sorting:
- ☆59Updated 2 years ago
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆105Updated 3 years ago
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- Contains all the scripts and sample apps related to android in app protections.☆37Updated last month
- ☆95Updated 3 years ago
- Analysis and proof-of-concept bypass of Promon SHIELD's Android application protection☆186Updated 2 years ago
- Files used to resolve the r2pay challenge☆54Updated 5 years ago
- Python API Monitor for Android apps☆84Updated last year
- Stealth patch for Frida, stealth knowledge collection☆114Updated last year
- My own collection of Frida scripts and tricks☆69Updated 4 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆358Updated 2 years ago
- A Reversal and bypass for Appsealing☆85Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆160Updated 2 years ago
- Frida hook generator for Ghidra☆127Updated 4 months ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆176Updated 11 months ago
- Instructions tracing powered by frida☆182Updated 6 years ago
- Plugins for reversing android apps in JEB☆77Updated last year
- ☆84Updated last year
- Dynamic injection tool for Linux/Android☆196Updated last year
- A modular and extendable Python tool for emulating simple SMALI code.☆92Updated last year
- mobile reverse engineering framework☆55Updated this week
- A Python script that dynamically attaches Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without roo…☆145Updated 2 weeks ago
- Miscellaneous code☆109Updated 6 months ago
- jni.h compiled for Ghidra☆92Updated 5 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Updated last year
- Defeat Java packers via Frida instrumentation☆211Updated last month
- ☆130Updated 2 years ago
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆69Updated last year
- A place to reborn☆60Updated 3 years ago
- ☆59Updated 10 months ago