darklotuskdb / auto-launch-frida-server
The process involves downloading the latest version and automatically configuring it within the Termux Android application. Subsequently, upon launching the Termux application, Frida Server is initiated automatically to facilitate penetration testing.
☆15Updated 3 weeks ago
Alternatives and similar repositories for auto-launch-frida-server:
Users that are interested in auto-launch-frida-server are comparing it to the libraries listed below
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆30Updated 10 months ago
- A quick and dirty script to bypass SSL pinning of Flutter applications☆26Updated 9 months ago
- Extracting unpacked dec files from running application using frida.☆37Updated 2 years ago
- BlueStacks privilege escalation through VM backdooring☆20Updated 9 months ago
- https://github.com/frida/frida-python with devkit☆22Updated 5 months ago
- ☆13Updated last month
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Updated 2 years ago
- Anti-EmuDetector is a frida script that bypass the emulator detection techniques in android☆32Updated 3 years ago
- Scripts to set up your own Android 📱 app hacking lab☆81Updated 9 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆24Updated 2 years ago
- Simple exploit POC for https://promon.co/security-news/strandhogg/ which can steal username and password from targeted android package pr…☆18Updated 3 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆18Updated last year
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆57Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆65Updated 8 months ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 6 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆26Updated last year
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆64Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated 10 months ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆16Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- Easy-to-use Android library for tampering detection, with a sample app included☆51Updated last month
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 8 months ago
- ☆11Updated last year
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year