synacktiv / frinetLinks
Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.
☆561Updated 2 months ago
Alternatives and similar repositories for frinet
Users that are interested in frinet are comparing it to the libraries listed below
Sorting:
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆179Updated last year
- Android 14 kernel exploit for Pixel7/8 Pro☆515Updated last year
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆391Updated 7 months ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆629Updated 5 months ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆354Updated 2 years ago
- Code Coverage Exploration Plugin for Ghidra☆358Updated last year
- Analyze Golang with Ghidra☆176Updated last month
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆450Updated 2 months ago
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆364Updated 2 years ago
- aiDAPal is an IDA Pro plugin that uses a locally running LLM that has been fine-tuned for Hex-Rays pseudocode to assist with code analysi…☆332Updated 9 months ago
- A decompiler-agnostic plugin for interacting with AI in your decompiler. GPT-4, Claude, and local models supported!☆633Updated 3 months ago
- Slides & Hands-on for the reverse engineering workshop☆183Updated 2 years ago
- An intuitive query API for IDA Pro☆158Updated 5 months ago
- JADX-gui scripting plugin for dynamic decompiler manipulation☆686Updated last year
- Frida hook generator for Ghidra☆126Updated 2 months ago
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆694Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆263Updated 2 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆144Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆670Updated 2 weeks ago
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆379Updated 3 weeks ago
- IDA Pro Plugin for serving MCP SSE server for cursor / claude☆141Updated 2 months ago
- Dynamic injection tool for Linux/Android☆167Updated 7 months ago
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆180Updated 4 months ago
- Slides and videos from my public speeches / conferences☆76Updated 2 months ago
- A Model Context Protocol server for IDA☆468Updated 2 months ago
- Statically unpacking common android banker malware.☆157Updated 4 months ago
- The ARTful library for dynamically modifying the Android Runtime☆338Updated last year
- FLARE Team's Binary Navigator☆276Updated 3 weeks ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆261Updated 9 months ago
- ☆202Updated last year