nccgroup / houseLinks
A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
☆1,434Updated 4 years ago
Alternatives and similar repositories for house
Users that are interested in house are comparing it to the libraries listed below
Sorting:
- A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.☆1,332Updated last year
- The new bridge between Burp Suite and Frida!☆1,721Updated last year
- Documentation:☆1,592Updated 2 years ago
- Hand-crafted Frida examples☆2,422Updated 6 months ago
- Radare2 and Frida better together.☆1,275Updated last week
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,097Updated 2 years ago
- Full featured multi arch/os debugger built on top of PyQt5 and frida☆1,302Updated last year
- Frida Scripts☆636Updated 2 years ago
- A universal memory dumper using Frida☆793Updated 10 months ago
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,777Updated this week
- Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)☆3,229Updated last year
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,227Updated 3 weeks ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,723Updated last year
- Binary instrumentation framework based on FRIDA☆1,944Updated this week
- Collection of useful FRIDA Mobile Scripts☆409Updated 3 years ago
- A tool that helps you work with frida easily for Android platform☆546Updated 6 months ago
- Frida Python bindings☆814Updated this week
- Frida CLI tools☆393Updated this week
- Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)☆2,890Updated 4 years ago
- ☆433Updated 9 months ago
- Script to quickly hook natives call to JNI in Android☆573Updated last year
- Bypass SSL certificate pinning for most applications☆723Updated 6 years ago
- Lets you hook Method Calls in Frida ( Android )☆392Updated 5 years ago
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆833Updated 8 years ago
- Allows you to partly emulate an Android native library.☆1,450Updated 3 months ago
- Example Frida agent written in TypeScript☆797Updated 11 months ago
- A tool that helps you easy trace classes, functions, and modify the return values of methods on iOS platform☆1,011Updated last month
- Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.☆543Updated 2 years ago
- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis☆1,132Updated 2 years ago
- Reverse engineering Android☆575Updated last year