humblepoti / flutter-modified
libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5
☆11Updated 3 years ago
Alternatives and similar repositories for flutter-modified:
Users that are interested in flutter-modified are comparing it to the libraries listed below
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Updated 2 years ago
- A Bash wrapper for radamsa that can be used to fuzz exported activities and deep links.☆50Updated 3 years ago
- Cisco RV110w UPnP stack overflow☆26Updated 3 years ago
- Official Dexcalibur documentation☆16Updated 3 years ago
- Frida Memory Dumper and Scanner for native Linux apps and Windows apps☆17Updated 2 years ago
- Github Actions based repo to extract files from APKs.☆26Updated 11 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆48Updated last year
- Bypass security checks in IOSSecuritySuite and Rootbear☆42Updated last year
- Android Malware Tracker☆27Updated 9 months ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆17Updated 4 years ago
- Repository with research related to Android☆13Updated 6 years ago
- frown (frida-own) – an instrumentation challenge☆24Updated 11 months ago
- ☆29Updated 2 years ago
- ☆15Updated last year
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- ☆16Updated 2 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆43Updated 2 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆38Updated 4 years ago
- android-inject-hook☆16Updated 6 years ago
- Type diagram plugin for JADX decompiler☆53Updated 6 months ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆11Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- ☆12Updated 2 years ago
- ☆30Updated 2 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆83Updated 11 months ago
- A demo app vulnerable to directory traversal☆15Updated 4 years ago
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆35Updated 4 years ago
- The Android Agent for the Mercury Security Assessment Framework.☆10Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆34Updated last year
- Generate Frida hooks directly from JEB!☆79Updated last year