nccgroup / house
A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
☆1,429Updated 3 years ago
Alternatives and similar repositories for house:
Users that are interested in house are comparing it to the libraries listed below
- A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.☆1,306Updated last year
- The new bridge between Burp Suite and Frida!☆1,694Updated last year
- Hand-crafted Frida examples☆2,385Updated 4 months ago
- Radare2 and Frida better together.☆1,251Updated this week
- Full featured multi arch/os debugger built on top of PyQt5 and frida☆1,297Updated 10 months ago
- Documentation:☆1,584Updated last year
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,085Updated 2 years ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,172Updated last week
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,724Updated 3 months ago
- A universal memory dumper using Frida☆782Updated 7 months ago
- Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)☆3,189Updated last year
- Frida Scripts☆629Updated 2 years ago
- Binary instrumentation framework based on FRIDA☆1,822Updated last week
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,684Updated last year
- Collection of useful FRIDA Mobile Scripts☆406Updated 3 years ago
- Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)☆2,868Updated 4 years ago
- Frida CLI tools☆381Updated this week
- Frida Python bindings☆803Updated this week
- A tool that helps you work with frida easily for Android platform☆521Updated 4 months ago
- ☆426Updated 7 months ago
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆819Updated 8 years ago
- Script to quickly hook natives call to JNI in Android☆561Updated last year
- Lets you hook Method Calls in Frida ( Android )☆391Updated 5 years ago
- TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.☆1,607Updated 10 months ago
- (WIP) Runtime Application Instruments for iOS. Previously Passionfruit☆849Updated last month
- Blackbox Protobuf is a set of tools for working with encoded Protocol Buffers (protobuf) without the matching protobuf definition.☆590Updated 2 weeks ago
- Flutter Reverse Engineering Framework☆1,337Updated 2 years ago
- 🔨 Break Java Reverse Engineering form Memory World!☆839Updated 2 years ago
- A tool that helps you easy trace classes, functions, and modify the return values of methods on iOS platform☆981Updated 9 months ago
- Bypass SSL certificate pinning for most applications☆718Updated 6 years ago