darklotuskdb / auto-launch-frida-serverLinks
The process involves downloading the latest version and automatically configuring it within the Termux Android application. Subsequently, upon launching the Termux application, Frida Server is initiated automatically to facilitate penetration testing.
☆19Updated 6 months ago
Alternatives and similar repositories for auto-launch-frida-server
Users that are interested in auto-launch-frida-server are comparing it to the libraries listed below
Sorting:
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆76Updated last year
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- Extracting unpacked dec files from running application using frida.☆45Updated 2 years ago
- A quick and dirty script to bypass SSL pinning of Flutter applications☆41Updated last month
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆33Updated last year
- Updated Android biometric bypass script for Frida (from Kamil Breński, Krzysztof Pranczk and Mateusz Fruba, August 2019). The code resolv…☆42Updated 3 years ago
- Scripts to set up your own Android 📱 app hacking lab☆97Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated 2 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆42Updated 10 months ago
- This contains notes and code for my Troopers23 Beyond Java talk☆23Updated 2 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Updated 2 years ago
- https://github.com/frida/frida-python with devkit☆29Updated last month
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆26Updated 2 months ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated 2 years ago
- Anti-EmuDetector is a frida script that bypass the emulator detection techniques in android☆34Updated 3 years ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Updated last year
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆24Updated 2 weeks ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆39Updated 2 years ago
- ☆14Updated 10 months ago
- BlackHat Asia 2025 code and presentations☆18Updated 10 months ago
- A set of scripts to facilitate HTTP interception on mobile apps☆19Updated 2 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated last year
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆47Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Updated last year
- The iOS Reloader is a weaponizing tool for jailbroken iOS devices. It facilitates the installation of a collection of tools on iOS device…☆17Updated 4 months ago
- A Magisk module that simplifies running the Frida server on Android, with easy management commands to download specific versions, enable …☆31Updated 9 months ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Updated 2 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Updated 3 years ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Updated 3 months ago