enovella / r2frida-wiki
This repo aims at providing practical examples on how to use r2frida
☆199Updated 4 years ago
Alternatives and similar repositories for r2frida-wiki
Users that are interested in r2frida-wiki are comparing it to the libraries listed below
Sorting:
- Miscellaneous programs/scripts to make your life a little less painful☆162Updated 5 years ago
- My own collection of Frida scripts and tricks☆69Updated 3 years ago
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆167Updated 2 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆161Updated 4 years ago
- Mobile security trainings based on android☆105Updated 4 years ago
- PoC Frida script to view Android libbinder traffic☆135Updated 9 months ago
- Frida module to hook module initializations on android☆67Updated 4 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆182Updated 4 years ago
- A collection of secRet frida scripts☆64Updated 4 years ago
- Frida-based general purpose fuzzer☆216Updated 4 years ago
- Easy to use Frida python binding script☆119Updated 7 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆103Updated 3 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆314Updated last year
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- Automated Frida hook generation with JEB☆146Updated last year
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆43Updated 2 years ago
- A universal memory dumper using Frida for Python 3☆215Updated 6 months ago
- Files used to resolve the r2pay challenge☆51Updated 4 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆277Updated 2 months ago
- Android application tracer powered by Frida☆78Updated 5 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆572Updated 4 years ago
- Android Dex disassembler and Binary Ninja plugin☆60Updated last year
- ☆31Updated 2 years ago
- Trace APIs declaratively through Frida.☆233Updated last year
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆137Updated 9 years ago
- Official Dexcalibur documentation☆16Updated 3 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago
- soFrida - Dynamic Analysis Tool for Mobile Applications☆106Updated 5 years ago
- Instructions tracing powered by frida☆178Updated 5 years ago
- Defeat Java packers via Frida instrumentation☆200Updated 2 years ago