nccgroup / houseLinks
A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
☆1,436Updated 4 years ago
Alternatives and similar repositories for house
Users that are interested in house are comparing it to the libraries listed below
Sorting:
- The new bridge between Burp Suite and Frida!☆1,722Updated last year
- A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.☆1,341Updated last year
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,102Updated 2 years ago
- Radare2 and Frida better together.☆1,284Updated this week
- Documentation:☆1,592Updated 2 years ago
- Hand-crafted Frida examples☆2,432Updated 7 months ago
- Full featured multi arch/os debugger built on top of PyQt5 and frida☆1,304Updated last year
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,246Updated 2 weeks ago
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,800Updated 2 weeks ago
- A universal memory dumper using Frida☆801Updated 10 months ago
- Frida Scripts☆640Updated 2 years ago
- Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)☆3,249Updated last year
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,729Updated last year
- Binary instrumentation framework based on FRIDA☆1,965Updated last week
- Collection of useful FRIDA Mobile Scripts☆411Updated 3 years ago
- Frida CLI tools☆396Updated this week
- A tool that helps you work with frida easily for Android platform☆554Updated 7 months ago
- Frida Python bindings☆815Updated this week
- Lets you hook Method Calls in Frida ( Android )☆391Updated 5 years ago
- Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)☆2,897Updated 4 years ago
- Script to quickly hook natives call to JNI in Android☆575Updated last year
- ☆434Updated 10 months ago
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆404Updated last year
- Bypass SSL certificate pinning for most applications☆725Updated 6 years ago
- Example Frida agent written in TypeScript☆806Updated 3 weeks ago
- Flutter Reverse Engineering Framework☆1,384Updated 3 years ago
- Quark Agent - Your AI-powered Android APK Analyst☆1,459Updated this week
- Blackbox Protobuf is a set of tools for working with encoded Protocol Buffers (protobuf) without the matching protobuf definition.☆624Updated last week
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆840Updated 8 years ago
- MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile applicat…☆643Updated 5 years ago