nccgroup / blackboxprotobufLinks
Blackbox Protobuf is a set of tools for working with encoded Protocol Buffers (protobuf) without the matching protobuf definition.
☆642Updated 2 months ago
Alternatives and similar repositories for blackboxprotobuf
Users that are interested in blackboxprotobuf are comparing it to the libraries listed below
Sorting:
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆379Updated 3 weeks ago
- Frida CLI tools☆411Updated this week
- Frida Scripts☆639Updated 2 years ago
- The new bridge between Burp Suite and Frida!☆1,731Updated last year
- Script to quickly hook natives call to JNI in Android☆582Updated 2 years ago
- A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.☆1,350Updated last year
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,444Updated 4 years ago
- Example Frida agent written in TypeScript☆828Updated 2 months ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,747Updated 2 years ago
- Frida Python bindings☆828Updated last week
- A tool that helps you work with frida easily for Android platform☆566Updated 9 months ago
- Radare2 and Frida better together.☆1,304Updated this week
- Collection of useful FRIDA Mobile Scripts☆411Updated 4 years ago
- A universal memory dumper using Frida☆808Updated last year
- Generic Script To Bypass Some AntiFrida Checks☆508Updated 11 months ago
- A Frida script that disables Flutter's TLS verification☆468Updated 3 months ago
- ☆441Updated last month
- Hand-crafted Frida examples☆2,460Updated 8 months ago
- 🔨 Break Java Reverse Engineering form Memory World!☆857Updated 2 years ago
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆405Updated last year
- Examples of using frida to hook android apps☆179Updated 3 years ago
- Full featured multi arch/os debugger built on top of PyQt5 and frida☆1,307Updated last year
- Frida scripts to directly MitM all HTTPS traffic from a target mobile application☆1,563Updated 3 weeks ago
- Engine used by jnitrace to intercept JNI API calls.☆324Updated 2 years ago
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆855Updated 8 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆626Updated 5 months ago
- Injects frida gadget using zygisk to bypass anti-tamper checks.☆717Updated 3 weeks ago
- Defeat Java packers via Frida instrumentation☆206Updated 2 years ago
- Automated tool for patching APKs to enable the use of Frida gadget by downloading the library and injecting code into the main activity.☆290Updated 2 months ago
- ☆252Updated 3 years ago