securitygrind / lz4_decompress
☆12Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for lz4_decompress
- Decompress Xamarin .NET compressed binaries so they can be decompiled.☆47Updated 4 years ago
- A Frida script to bypass Xamarin certificate pinning implementations☆66Updated last year
- Extract .NET assemblies from Xamarin mobile applications.☆41Updated 3 years ago
- Python utility for parsing Xamarin AssemblyStore blob files☆141Updated 6 months ago
- ☆55Updated 4 years ago
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆163Updated last year
- Frida hook generator for Ghidra☆104Updated 5 months ago
- ☆87Updated 2 years ago
- Miscellaneous code☆97Updated last month
- My own collection of Frida scripts and tricks☆66Updated 3 years ago
- Some Of Anti-Frida Stuff☆107Updated 2 years ago
- Can you change the server ?☆84Updated last week
- Collection of useful FRIDA Mobile Scripts☆116Updated last year
- A burp for intents wannabe☆44Updated 3 months ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆107Updated last month
- A modular and extendable Python tool for emulating simple SMALI code.☆84Updated 6 months ago
- All the mono c exports, ready to be used in frida!☆69Updated 4 years ago
- Malware dynamic instrumentation tool based on frida framework☆101Updated 4 years ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆161Updated 6 months ago
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆73Updated 2 years ago
- An iOS app that lets you practice your Frida skills☆146Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆138Updated 10 months ago
- ☆28Updated 2 years ago
- A blog about learning how to use the Frida dynamic instrumentation toolkit with Android☆28Updated last year
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆35Updated 4 years ago
- Inject JS and C# into Windows apps, call COM and WinRT APIs☆88Updated 5 years ago
- Notes for my video on running an ARM64 Android emulator in Azure☆34Updated 3 months ago
- A place to reborn☆56Updated last year
- jni.h compiled for Ghidra☆68Updated 4 years ago