A universal memory dumper using Frida for Python 3
☆248Nov 7, 2024Updated last year
Alternatives and similar repositories for fridump3
Users that are interested in fridump3 are comparing it to the libraries listed below
Sorting:
- A universal memory dumper using Frida☆838Aug 7, 2024Updated last year
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Find JNI native methods while the app is running.☆22Oct 26, 2024Updated last year
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- Create a stream from a filesystem resource.☆50May 22, 2025Updated 9 months ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- A collection of my Frida instrumentation scripts to reverse engineer mobile apps and more.☆1,574Updated this week
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- BSides Munich Frida Workshop 2018☆48Aug 8, 2018Updated 7 years ago
- Tool to make in memory man in the middle☆125Oct 8, 2018Updated 7 years ago
- Radare 2 wiki☆94Apr 24, 2020Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago
- PoC to bypass Android restrictions☆217Mar 27, 2019Updated 6 years ago
- Mobile Edge-Dynamic Unified Security Analysis☆2,197Mar 11, 2026Updated last week
- Some tee/trustzone helper stuff☆55Sep 29, 2019Updated 6 years ago
- Mobile app memory view & edit PyQt6 program☆74May 1, 2025Updated 10 months ago
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,984Updated this week
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- Radare2 and Frida better together.☆1,384Updated this week
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,435Jan 29, 2026Updated last month
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Jul 1, 2017Updated 8 years ago
- Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)☆3,422Jan 5, 2024Updated 2 years ago
- Hand-crafted Frida examples☆2,519Nov 29, 2024Updated last year
- A Fuzzer for Windows NDIS Drivers OID Handlers☆96Nov 4, 2021Updated 4 years ago
- PoC Frida script to view Android libbinder traffic☆141Jul 27, 2024Updated last year
- Property extractor for Android apps☆310Mar 24, 2025Updated 11 months ago
- ☆22Jul 6, 2018Updated 7 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Android APK analyzer based on radare2 and others.☆154Apr 9, 2020Updated 5 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Documentation:☆1,614May 1, 2023Updated 2 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile ap…☆868Apr 27, 2021Updated 4 years ago