VerSprite / engage
Tools and Materials for the Frida Engage Blog Series
☆45Updated 6 years ago
Alternatives and similar repositories for engage:
Users that are interested in engage are comparing it to the libraries listed below
- Collection of IDA scripts☆40Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- ☆32Updated 5 years ago
- Android Vulnerability Reports and POCs.☆25Updated 7 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 8 years ago
- JNI Helper Plugin☆52Updated last month
- r2 plugin for Dwarf☆29Updated 5 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- A collection of secRet frida scripts☆64Updated 4 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆27Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- IDA PDB Loader☆47Updated 6 years ago
- A smali emulator.☆24Updated 6 years ago
- ELF header abuse☆46Updated 8 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 6 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆23Updated 11 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- [Digital Whisper] Reverse Engineering Automation Article - Source Codes☆63Updated 2 years ago
- just an experiment☆21Updated 6 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 8 years ago
- An Android port of radamsa fuzzer☆65Updated 5 years ago
- IDA, Ghidra and Radare2 scripts. Also Android scripts to make your life easier.☆48Updated 5 years ago
- ☆38Updated 8 years ago
- iOS Frida Scripts☆37Updated 7 years ago
- ☆24Updated 7 years ago
- CVE-2014-4322 Exploit☆23Updated 8 years ago