Learn how to intercept flutter apps
☆25Jan 19, 2024Updated 2 years ago
Alternatives and similar repositories for Intercept-Flutter-Apps
Users that are interested in Intercept-Flutter-Apps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- DLL Hijacking Detection Tool☆15Jun 21, 2025Updated 10 months ago
- Ghosting-AMSI☆18Apr 30, 2025Updated last year
- ☆21Jan 12, 2025Updated last year
- Farm-to-table, organic, handcrafted, delicious Webassembly☆15Dec 7, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- Pine Hook +☆48Nov 10, 2025Updated 5 months ago
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆75Mar 31, 2026Updated last month
- Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it …☆21May 11, 2021Updated 4 years ago
- ☆15Jul 30, 2024Updated last year
- Transparent Proxy via Frida hooks☆36Oct 26, 2023Updated 2 years ago
- Find JNI native methods while the app is running.☆23Oct 26, 2024Updated last year
- Mr Free SMS Sender - MrTools☆11May 4, 2023Updated 3 years ago
- A shortlist of core ServiceNow tables.☆15Oct 16, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Patches needed to build VMware (Player and Workstation) host modules against recent kernels☆17Sep 20, 2025Updated 7 months ago
- ☆25Apr 29, 2025Updated last year
- Binary Ninja deobfuscation plugin☆22Jul 23, 2025Updated 9 months ago
- ☆20Dec 10, 2020Updated 5 years ago
- Inspect and instrument React Native applications at runtime☆121Nov 19, 2024Updated last year
- Creation of multiple Malware tools consisting of evasion, enumeration and exploitation☆101Updated this week
- ☆12Apr 13, 2026Updated 3 weeks ago
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆33Jan 31, 2026Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Collection of malware analysis, binary exploitation and reverse engineering related resources☆27Mar 5, 2026Updated last month
- examples of using radius2 to solve reversing challenges☆36Jan 3, 2025Updated last year
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 10 months ago
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆49Sep 23, 2025Updated 7 months ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- A lightweight Python-based tool to extract and enumerate Android components and automatically generate practical ADB commands☆112Jun 14, 2025Updated 10 months ago
- ☆27Apr 18, 2026Updated 2 weeks ago
- The actual injected payload of Fripack.☆28Updated this week
- ☆49Apr 9, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆19May 14, 2024Updated last year
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 9 months ago
- Ida Pro plugin to aid in reverse engineering Rust binaries.☆19Dec 9, 2024Updated last year
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated last year
- ☆11Dec 8, 2023Updated 2 years ago
- A frightfully intelligent algorithmic trading automaton of noble birth. Sir Reginald's prime directive: to acquire undervalued assets pos…☆42Sep 18, 2025Updated 7 months ago
- ☆22Feb 9, 2023Updated 3 years ago