mengxipeng1122 / frida-mod
Frida module utils, writen in typescript
☆15Updated last year
Alternatives and similar repositories for frida-mod:
Users that are interested in frida-mod are comparing it to the libraries listed below
- A frida module to parse Elf headers in runtime☆32Updated 5 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Updated last year
- Android ART hooking native library supporting Android 5.0 to 10.0☆18Updated 5 years ago
- ☆18Updated 2 years ago
- Utilities scripts and Python module to facilitate executing idapython scripts in IDA.☆24Updated 2 weeks ago
- stupid ptrace tricks☆11Updated 3 years ago
- Slim dockerized Android ndk☆11Updated 2 years ago
- Getting better stacks and backtraces in Frida☆36Updated 8 months ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆16Updated 5 years ago
- Some 'one-line' frida api to avoid code recycling here and there☆28Updated 5 years ago
- Update Frida hooks automatically.☆27Updated last year
- Higher-level Python interface for frida☆22Updated 10 months ago
- A small utilities to scan process memory and search patterns using frida with a single line of command☆21Updated 3 years ago
- ☆15Updated 3 years ago
- ☆29Updated 2 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Updated 2 years ago
- 🕵️ The crappy, magical string Java/Android decrypter☆9Updated 5 years ago
- In-memory ELF shared library loading☆37Updated 2 years ago
- 修改Opcode有关,写入map文件时函数末尾数据暂时有问题☆15Updated 6 years ago
- ☆13Updated 4 years ago
- Dump process memory with FRIDA.☆14Updated last year
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated last year
- Start method tracing using Android's internal APIs☆12Updated 7 years ago
- simple dex string deobfuscator☆12Updated 4 years ago
- Dynamic Tracing in Android (fork from iovisor/ply)☆20Updated 2 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- Root takeover via signature spoofing in KernelSU☆17Updated last year
- ☆35Updated 6 years ago
- Binary Ninja plugin to clean up some common obfuscation techniques.☆19Updated 4 years ago