synacktiv / frinetLinks
Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.
☆566Updated 3 months ago
Alternatives and similar repositories for frinet
Users that are interested in frinet are comparing it to the libraries listed below
Sorting:
- Android 14 kernel exploit for Pixel7/8 Pro☆519Updated last year
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆180Updated last year
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆635Updated 6 months ago
- aiDAPal is an IDA Pro plugin that uses a locally running LLM that has been fine-tuned for Hex-Rays pseudocode to assist with code analysi…☆338Updated 10 months ago
- A decompiler-agnostic plugin for interacting with AI in your decompiler. GPT-4, Claude, and local models supported!☆642Updated 4 months ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆356Updated 2 years ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆465Updated 4 months ago
- Code Coverage Exploration Plugin for Ghidra☆361Updated last year
- Analyze Golang with Ghidra☆183Updated 2 months ago
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆392Updated 8 months ago
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆367Updated last month
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆418Updated last week
- Frida hook generator for Ghidra☆128Updated last month
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆203Updated 5 months ago
- An intuitive query API for IDA Pro☆159Updated 6 months ago
- A Model Context Protocol server for IDA☆478Updated 4 months ago
- JADX-gui scripting plugin for dynamic decompiler manipulation☆693Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆685Updated last week
- The ARTful library for dynamically modifying the Android Runtime☆339Updated last year
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆712Updated 3 weeks ago
- Dynamic injection tool for Linux/Android☆180Updated 9 months ago
- Slides & Hands-on for the reverse engineering workshop☆183Updated 2 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆265Updated 2 years ago
- ☆206Updated 2 years ago
- Slides and videos from my public speeches / conferences☆76Updated 4 months ago
- FLARE Team's Binary Navigator☆284Updated 2 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆145Updated last year
- Nyxstone: assembly / disassembly library based on LLVM, implemented in C++ with Rust and Python bindings, maintained by emproof.com☆389Updated 10 months ago
- Ghidra Wasm plugin with disassembly and decompilation support☆341Updated last month
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆1,504Updated this week