marin-m / pbtk
A toolset for reverse engineering and fuzzing Protobuf-based apps
β1,446Updated 3 months ago
Alternatives and similar repositories for pbtk:
Users that are interested in pbtk are comparing it to the libraries listed below
- π΅οΈ Tool to reverse-engineer Protocol Buffers with unknown definitionβ979Updated 4 years ago
- Radare2 and Frida better together.β1,213Updated this week
- A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.β1,280Updated last year
- Hand-crafted Frida examplesβ2,332Updated last month
- Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)β3,139Updated last year
- Blackbox Protobuf is a set of tools for working with encoded Protocol Buffers (protobuf) without the matching protobuf definition.β554Updated last month
- The new bridge between Burp Suite and Frida!β1,672Updated 9 months ago
- Frida Python bindingsβ791Updated this week
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Androidβ2,119Updated this week
- Documentation:β1,573Updated last year
- Full featured multi arch/os debugger built on top of PyQt5 and fridaβ1,286Updated 8 months ago
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.β1,410Updated 3 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzesβ¦β1,071Updated last year
- Bypass SSL certificate pinning for most applicationsβ713Updated 6 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.β1,645Updated last year
- A Dynamic Binary Instrumentation framework based on LLVM.β1,441Updated this week
- A universal memory dumper using Fridaβ762Updated 5 months ago
- Frida core library intended for static linking into bindingsβ629Updated this week
- Frida scripts to directly MitM all HTTPS traffic from a target mobile applicationβ1,226Updated 5 months ago
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).β803Updated 8 years ago
- A Coverage Explorer for Reverse Engineersβ2,285Updated 6 months ago
- Android Reverse-Engineering Workbench for VS Codeβ2,764Updated 8 months ago
- Android App Reverse Engineering Workshopβ1,447Updated 9 months ago
- Example Frida agent written in TypeScriptβ746Updated 6 months ago
- Self-optimizing cross-platform code tracer based on dynamic recompilationβ600Updated 2 years ago
- Flutter Reverse Engineering Frameworkβ1,852Updated last week
- Decrypts and logs a process's SSL traffic.β1,103Updated 4 years ago
- Tiny cute emulator plugin for IDA based on unicorn.β1,123Updated 5 months ago
- Frida CLI toolsβ368Updated this week
- Runtime Mobile Security (RMS) π±π₯ - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtimeβ2,670Updated last month