hac425xxx / whatsapp-fuzzingView external linksLinks
☆19Nov 17, 2019Updated 6 years ago
Alternatives and similar repositories for whatsapp-fuzzing
Users that are interested in whatsapp-fuzzing are comparing it to the libraries listed below
Sorting:
- Dump process memory with FRIDA.☆16Feb 29, 2024Updated last year
- ☆21Jan 15, 2018Updated 8 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Jul 29, 2022Updated 3 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- Instructions tracing powered by frida☆182Jul 8, 2019Updated 6 years ago
- A Bash wrapper for radamsa that can be used to fuzz exported activities and deep links.☆52Aug 17, 2021Updated 4 years ago
- JNI Helper Plugin☆54Dec 5, 2024Updated last year
- 抖音通信协议加密,设备注册/阅读/点赞☆11Dec 27, 2018Updated 7 years ago
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- smali trace☆207May 22, 2022Updated 3 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Nov 18, 2019Updated 6 years ago
- Plugins for reversing android apps in JEB☆78Oct 6, 2024Updated last year
- The Frida based fuzzer all in one☆30Mar 13, 2021Updated 4 years ago
- InHouse safetynet killer☆31Jun 23, 2019Updated 6 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 2 months ago
- Inlining functions in IDA HexRays using microcode. Abandoned due to official outline support in IDA v8.0☆16Feb 19, 2023Updated 2 years ago
- 基于Flask框架和frida开发的一款frida server☆12Nov 5, 2019Updated 6 years ago
- 在FART的基础上进行优化。实现更深的主动调用。适用AOSP10☆14Aug 5, 2021Updated 4 years ago
- ☆15Oct 31, 2022Updated 3 years ago
- Heaps Don't Lie! Analyzes standard JVM and Android heap snapshots to improve the completeness of program analysis tools such as Doop.☆15May 3, 2024Updated last year
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆130Sep 18, 2023Updated 2 years ago
- ☆32Nov 6, 2019Updated 6 years ago
- 基于Frida的脱壳工具☆12Jul 9, 2018Updated 7 years ago
- ☆18May 25, 2022Updated 3 years ago
- 利用android_inject和hookZz框架写的一个Android zygote注入andorid程序,进行中☆12Apr 8, 2018Updated 7 years ago
- whatsapp android reverse (whatsapp 安卓协议分析)☆34Nov 30, 2020Updated 5 years ago
- ☆18Jul 15, 2020Updated 5 years ago
- ☆33Jan 14, 2026Updated last month
- ☆15Jun 24, 2021Updated 4 years ago
- Proof of concept app for Android permanent denial-of-service vulnerability CVE-2020-0443☆17Mar 15, 2022Updated 3 years ago
- Control flow obfuscation for Java code☆12Oct 3, 2021Updated 4 years ago
- Android Security Bug Queries for CheckMarx☆20Sep 13, 2022Updated 3 years ago
- ☆214Aug 11, 2023Updated 2 years ago
- A IDA plugin to show ARM MSRs nicely☆85Jan 4, 2023Updated 3 years ago
- A small script to get syscall info from its number (intented to be used with Frida)☆21Aug 11, 2021Updated 4 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Jun 3, 2018Updated 7 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆184May 2, 2021Updated 4 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆95Oct 28, 2021Updated 4 years ago