httptoolkit / frida-interception-and-unpinningLinks
Frida scripts to directly MitM all HTTPS traffic from a target mobile application
☆1,563Updated 3 weeks ago
Alternatives and similar repositories for frida-interception-and-unpinning
Users that are interested in frida-interception-and-unpinning are comparing it to the libraries listed below
Sorting:
- Remove Certificate Pinning from APKs☆749Updated last month
- Hand-crafted Frida examples☆2,462Updated 8 months ago
- A tool that helps you work with frida easily for Android platform☆566Updated 9 months ago
- A Frida script that disables Flutter's TLS verification☆471Updated 3 months ago
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,183Updated this week
- Script to root AVDs running with QEMU Emulator from Android Studio☆1,632Updated last year
- Flutter Reverse Engineering Framework☆2,176Updated last week
- A Magisk/KernelSU module that automatically adds user certificates to the system root CA store☆2,086Updated 2 months ago
- Flutter Mobile Application Reverse Engineering Tool☆1,745Updated 2 weeks ago
- A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.☆1,350Updated last year
- Flutter Reverse Engineering Framework☆1,399Updated 3 years ago
- Binary instrumentation framework based on FRIDA☆2,023Updated this week
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,753Updated 2 years ago
- The new bridge between Burp Suite and Frida!☆1,733Updated last year
- Blackbox Protobuf is a set of tools for working with encoded Protocol Buffers (protobuf) without the matching protobuf definition.☆644Updated 2 months ago
- Injects frida gadget using zygisk to bypass anti-tamper checks.☆717Updated 3 weeks ago
- A reverse engineering tool for decompiling and disassembling the React Native Hermes bytecode☆721Updated last year
- Bypass Tiktok SSL pinning on Android devices.☆754Updated 9 months ago
- Automated tool for patching APKs to enable the use of Frida gadget by downloading the library and injecting code into the main activity.☆290Updated 2 months ago
- Bypass android application SSL-pinning☆202Updated 2 years ago
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,834Updated 2 months ago
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,444Updated 4 years ago
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆380Updated this week
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,108Updated 2 years ago
- Bypass Instagram SSL pinning on Android devices.☆566Updated 7 months ago
- Example Frida agent written in TypeScript☆830Updated 2 months ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,296Updated 2 months ago
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆857Updated 8 years ago
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆405Updated 2 years ago
- A tool that helps you easy trace classes, functions, and modify the return values of methods on iOS platform☆1,056Updated last month