darklotuskdb / auto-launch-frida-serverLinks
The process involves downloading the latest version and automatically configuring it within the Termux Android application. Subsequently, upon launching the Termux application, Frida Server is initiated automatically to facilitate penetration testing.
☆17Updated 2 months ago
Alternatives and similar repositories for auto-launch-frida-server
Users that are interested in auto-launch-frida-server are comparing it to the libraries listed below
Sorting:
- https://github.com/frida/frida-python with devkit☆24Updated 6 months ago
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆30Updated 11 months ago
- Extracting unpacked dec files from running application using frida.☆38Updated 2 years ago
- BlueStacks privilege escalation through VM backdooring☆21Updated 10 months ago
- Updated Android biometric bypass script for Frida (from Kamil Breński, Krzysztof Pranczk and Mateusz Fruba, August 2019). The code resolv…☆36Updated 2 years ago
- A quick and dirty script to bypass SSL pinning of Flutter applications☆27Updated 11 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆31Updated last month
- Scripts to set up your own Android 📱 app hacking lab☆84Updated 10 months ago
- FridaMe is intentionally vulnerable android application developed to demonstrate the usage of Frida.☆8Updated last year
- Simple exploit POC for https://promon.co/security-news/strandhogg/ which can steal username and password from targeted android package pr…☆18Updated 3 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆27Updated last year
- Insecure Android Application for testing Biometric bypasses☆12Updated 2 years ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆23Updated last year
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆38Updated 10 months ago
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- Small POC code that detects known root-related apps by attempting to launch their activities and monitoring security exception.☆22Updated 2 months ago
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆19Updated this week
- Easy-to-use Android library for tampering detection, with a sample app included☆54Updated 2 months ago
- A set of scripts to facilitate HTTP interception on mobile apps☆12Updated last month
- The iOS Reloader is a weaponizing tool for jailbroken iOS devices. It facilitates the installation of a collection of tools on iOS device…☆13Updated last year
- ☆28Updated last year
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆68Updated 10 months ago
- Contains all the scripts and sample apps related to android in app protections.☆31Updated last year
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆24Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated 8 months ago
- Docker container to use blutter (dart decompiler for android apps)☆18Updated 8 months ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- Type diagram plugin for JADX decompiler☆62Updated 3 months ago
- ☆14Updated 2 months ago