iGio90 / FridaAndroidTracerLinks
Android application tracer powered by Frida
☆79Updated 5 years ago
Alternatives and similar repositories for FridaAndroidTracer
Users that are interested in FridaAndroidTracer are comparing it to the libraries listed below
Sorting:
- ☆32Updated 6 years ago
- A collection of secRet frida scripts☆66Updated 4 years ago
- Frida module to hook module initializations on android☆67Updated 4 years ago
- Android library for detecting Android virtual containers.☆70Updated 5 years ago
- PoC Frida script to view Android libbinder traffic☆140Updated last year
- Android app for demonstrating native library harnessing☆42Updated 7 years ago
- My own collection of Frida scripts and tricks☆69Updated 4 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆103Updated 8 years ago
- Mobile security trainings based on android☆107Updated 5 years ago
- Utility to read custom structure from Tencent's libshell packer☆39Updated 7 years ago
- ☆18Updated 5 years ago
- ☆76Updated 8 years ago
- Some 'one-line' frida api to avoid code recycling here and there☆28Updated 6 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆140Updated 9 years ago
- Android Library Code Recognition☆83Updated last year
- Tools and Materials for the Frida Engage Blog Series☆45Updated 7 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Updated 5 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆164Updated 5 years ago
- ☆28Updated 5 years ago
- Files used to resolve the r2pay challenge☆54Updated 5 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Updated 6 years ago
- JNI Helper Plugin☆54Updated last year
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- Automated Frida hook generation with JEB☆152Updated 2 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆41Updated 5 years ago
- ☆22Updated 3 weeks ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 2 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆91Updated 7 years ago