hexploitable / r2con2020_r2frida
This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.
☆36Updated 4 years ago
Alternatives and similar repositories for r2con2020_r2frida:
Users that are interested in r2con2020_r2frida are comparing it to the libraries listed below
- Some presentations I did in the past☆64Updated last year
- Official Dexcalibur documentation☆16Updated 3 years ago
- A place to reborn☆59Updated 2 years ago
- My own collection of Frida scripts and tricks☆67Updated 3 years ago
- frown (frida-own) – an instrumentation challenge☆24Updated last year
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆98Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆65Updated 3 years ago
- ☆21Updated last year
- Resources and writeups for studying & practicing iOS security☆54Updated 3 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆39Updated 4 years ago
- Fuzz iOS URL schemes☆112Updated 2 months ago
- Mobile CTF☆28Updated 6 years ago
- ☆74Updated 2 years ago
- ☆118Updated 2 months ago
- A burp for intents wannabe☆51Updated 6 months ago
- ☆114Updated last year
- This repo aims at providing practical examples on how to use r2frida☆199Updated 4 years ago
- A collection of my Ghidra scripts☆95Updated last year
- Malware dynamic instrumentation tool based on frida framework☆103Updated 4 years ago
- A collection of secRet frida scripts☆64Updated 4 years ago
- A Bash wrapper for radamsa that can be used to fuzz exported activities and deep links.☆51Updated 3 years ago
- ☆49Updated 4 years ago
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆43Updated 2 years ago
- Frida hook generator for Ghidra☆112Updated last month
- ☆31Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆50Updated 6 years ago
- The slides from my Saintcon 2019 talk.☆48Updated 5 years ago
- Slides and videos from my public speeches / conferences☆71Updated last month
- How to develop your own zero day vulnerabilities for iOS☆28Updated last year
- A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken☆27Updated 5 years ago