nccgroup / blackboxprotobufLinks
Blackbox Protobuf is a set of tools for working with encoded Protocol Buffers (protobuf) without the matching protobuf definition.
☆647Updated 2 months ago
Alternatives and similar repositories for blackboxprotobuf
Users that are interested in blackboxprotobuf are comparing it to the libraries listed below
Sorting:
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆386Updated 3 weeks ago
- Frida CLI tools☆414Updated 3 weeks ago
- Script to quickly hook natives call to JNI in Android☆588Updated 2 years ago
- Frida Scripts☆640Updated 2 years ago
- Example Frida agent written in TypeScript☆839Updated 3 months ago
- Collection of useful FRIDA Mobile Scripts☆411Updated 4 years ago
- The new bridge between Burp Suite and Frida!☆1,743Updated last year
- A collection of my Frida instrumentation scripts for reverse engineering of mobile apps and more.☆1,413Updated 2 weeks ago
- Frida Python bindings☆835Updated this week
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,754Updated 2 years ago
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,443Updated 4 years ago
- A tool that helps you work with frida easily for Android platform☆576Updated 9 months ago
- Radare2 and Frida better together.☆1,311Updated this week
- A universal memory dumper using Frida☆812Updated last year
- Generic Script To Bypass Some AntiFrida Checks☆516Updated last year
- Frida scripts to directly MitM all HTTPS traffic from a target mobile application☆1,589Updated last week
- ☆443Updated last month
- Hand-crafted Frida examples☆2,472Updated 9 months ago
- Examples of using frida to hook android apps☆178Updated 3 years ago
- A Frida script that disables Flutter's TLS verification☆476Updated 3 months ago
- Compile a Frida script comprised of one or more Node.js modules☆211Updated 3 months ago
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆860Updated 8 years ago
- ☆252Updated 3 years ago
- 🔨 Break Java Reverse Engineering form Memory World!☆859Updated 2 years ago
- Engine used by jnitrace to intercept JNI API calls.☆323Updated 2 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆631Updated 6 months ago
- Defeat Java packers via Frida instrumentation☆207Updated 2 years ago
- A JavaScript decompiler☆123Updated 2 years ago
- Automated tool for patching APKs to enable the use of Frida gadget by downloading the library and injecting code into the main activity.☆300Updated last week
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆404Updated 2 years ago