Nicholas1126 / frida-fuzzer-aioView external linksLinks
The Frida based fuzzer all in one
☆30Mar 13, 2021Updated 4 years ago
Alternatives and similar repositories for frida-fuzzer-aio
Users that are interested in frida-fuzzer-aio are comparing it to the libraries listed below
Sorting:
- Android Security Bug Queries for CheckMarx☆20Sep 13, 2022Updated 3 years ago
- you can use frida in jeb !☆47Sep 25, 2022Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 2 months ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆17Nov 26, 2019Updated 6 years ago
- In-memory ELF shared library loading☆45Dec 18, 2022Updated 3 years ago
- ☆65Aug 11, 2021Updated 4 years ago
- CPU模拟利器:Unicorn☆25Dec 15, 2024Updated last year
- ☆15Oct 31, 2022Updated 3 years ago
- ☆210Nov 6, 2025Updated 3 months ago
- BigMap integration on AFL++☆15Apr 5, 2021Updated 4 years ago
- 主要记录对各路frida脚本的整理,长期更新☆34Sep 25, 2023Updated 2 years ago
- Identify VMess packets in network traffic☆13Nov 21, 2022Updated 3 years ago
- ☆33Apr 4, 2022Updated 3 years ago
- 修复通过FART dump下来的dex☆29Aug 1, 2020Updated 5 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆130Sep 18, 2023Updated 2 years ago
- Dump process memory with FRIDA.☆16Feb 29, 2024Updated last year
- ☆15Jun 24, 2021Updated 4 years ago
- ☆19Nov 17, 2019Updated 6 years ago
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- ☆31Oct 13, 2025Updated 4 months ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Dec 19, 2019Updated 6 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆43Jan 18, 2024Updated 2 years ago
- Generic Frida Script To Bypass Root Detection☆56Sep 25, 2022Updated 3 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Jun 3, 2018Updated 7 years ago
- Fuzzing framework to target native components of android applications☆22Oct 22, 2022Updated 3 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆95Oct 28, 2021Updated 4 years ago
- Binary Ninja eBPF & Solana plugin (disasm & LLIL)☆37Aug 27, 2022Updated 3 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- aurora-d☆20Apr 24, 2022Updated 3 years ago
- Trace jni calls with eBPF on Android☆24Jun 21, 2022Updated 3 years ago
- An IDA processor for eBPF bytecode☆69Nov 7, 2024Updated last year
- Update Frida hooks automatically.☆27Sep 3, 2023Updated 2 years ago
- A kernel module for tracing signal☆31Jan 17, 2023Updated 3 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Jul 29, 2022Updated 3 years ago
- C++ name demangler written in javascript☆10Mar 3, 2023Updated 2 years ago
- An app intended for fuzzing the Android Binder interface and System Services☆116Sep 2, 2020Updated 5 years ago
- 主要记入自己复现过的android cve☆52Feb 28, 2022Updated 3 years ago
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆733Sep 11, 2025Updated 5 months ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆82Mar 19, 2024Updated last year