tlamb96 / kgb_messenger
An Android CTF practice challenge
☆111Updated 5 years ago
Alternatives and similar repositories for kgb_messenger:
Users that are interested in kgb_messenger are comparing it to the libraries listed below
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆98Updated 3 years ago
- This repo aims at providing practical examples on how to use r2frida☆199Updated 4 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆312Updated last year
- Mobile security trainings based on android☆104Updated 4 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆573Updated 4 years ago
- Android Malware Sandbox☆282Updated 2 years ago
- This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017☆221Updated 4 years ago
- My own collection of Frida scripts and tricks☆67Updated 3 years ago
- PoC Frida script to view Android libbinder traffic☆134Updated 6 months ago
- Examples of using frida to hook android apps☆168Updated 2 years ago
- ☆333Updated 5 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆141Updated last year
- Defeat Java packers via Frida instrumentation☆198Updated 2 years ago
- A quick and dirty app to download and launch Frida on Genymotion and rooted Physical Android Devices☆178Updated 11 months ago
- ☆167Updated 3 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆135Updated 8 years ago
- Frida scripts for mobile application dynamic-analysis.☆108Updated 9 months ago
- Miscellaneous code☆101Updated 2 weeks ago
- Easy to use Frida python binding script☆115Updated 6 years ago
- How to build an efficient pwn development environment in 2020☆259Updated 4 years ago
- r2con2019 - slides and materials☆136Updated 4 years ago
- Script to Bypass SSL/Certificate Pinning in Android☆132Updated 4 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- Slide decks from my conference presentations☆364Updated last year
- Coverage-guided binary fuzzing powered by Frida Stalker☆181Updated 3 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆338Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆239Updated 2 months ago
- Analysis scripts for Ghidra to work with Android NDK libraries.☆328Updated 2 years ago
- A collection of reverse engineering challenges for learning about the Android operating system and mobile security.☆361Updated 4 years ago
- soFrida - Dynamic Analysis Tool for Mobile Applications☆105Updated 4 years ago