JnitraceA Frida based tool that traces usage of the JNI API in Android apps.
Stars: ✭ 534 (+330.65%)
DwarfFull featured multi arch/os debugger built on top of PyQt5 and frida
Stars: ✭ 916 (+638.71%)
Magisk Frida🔐 Run frida-server on boot with Magisk, always up-to-date
Stars: ✭ 144 (+16.13%)
Frickfrick - aka the first debugger built on top of frida
Stars: ✭ 267 (+115.32%)
Frida ScriptsA collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.
Stars: ✭ 665 (+436.29%)
Jnitrace EngineEngine used by jnitrace to intercept JNI API calls.
Stars: ✭ 94 (-24.19%)
Iostracealternative strace for iOS device(64bit) on frida
Stars: ✭ 84 (-32.26%)
QbdiA Dynamic Binary Instrumentation framework based on LLVM.
Stars: ✭ 801 (+545.97%)
Luject🍹A static injector of dynamic library for application (android, iphoneos, macOS, windows, linux)
Stars: ✭ 203 (+63.71%)
Awesome Reverse EngineeringReverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Stars: ✭ 2,954 (+2282.26%)
AppmonDocumentation:
Stars: ✭ 1,157 (+833.06%)
Dexcalibur[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Stars: ✭ 512 (+312.9%)
Rms Runtime Mobile SecurityRuntime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
Stars: ✭ 1,194 (+862.9%)
WebplotdigitizerHTML5 based online tool to extract numerical data from plot images.
Stars: ✭ 1,605 (+1194.35%)
PokediamondDecompilation of Pokémon Diamond/Pearl
Stars: ✭ 110 (-11.29%)
Furikuri(In dev)furikuri is framework for code protection
Stars: ✭ 103 (-16.94%)
SojoboA binary analysis framework
Stars: ✭ 116 (-6.45%)
Re sysdiag逆向火绒安全软件驱动——sysdiag
Stars: ✭ 111 (-10.48%)
S2eS2E: A platform for multi-path program analysis with selective symbolic execution.
Stars: ✭ 102 (-17.74%)
StingrayIDAPython plugin for finding function strings recursively
Stars: ✭ 110 (-11.29%)
Hexd🔍 Colourful, human-friendly hexdump tool
Stars: ✭ 100 (-19.35%)
Flare IdaIDA Pro utilities from FLARE team
Stars: ✭ 1,374 (+1008.06%)
WufucDisables the "Unsupported Hardware" message in Windows Update, and allows you to continue installing updates on Windows 7 and 8.1 systems with Intel Kaby Lake, AMD Ryzen, or other unsupported processors.
Stars: ✭ 1,458 (+1075.81%)
Nfdx64dbgPlugin for x64dbg Linker/Compiler/Tool detector.
Stars: ✭ 105 (-15.32%)
Imhex🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Stars: ✭ 11,744 (+9370.97%)
Gdb StaticPublic repository of static GDB and GDBServer
Stars: ✭ 103 (-16.94%)
PokecrystalDisassembly of Pokémon Crystal
Stars: ✭ 1,549 (+1149.19%)
Vac HooksHook WinAPI functions used by Valve Anti-Cheat. Log calls and intercept arguments & return values. DLL written in C.
Stars: ✭ 103 (-16.94%)
Owasp FstmThe Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, consultants, hobbyists, and Information Security professionals with conducting firmware security assessments.
Stars: ✭ 120 (-3.23%)
BapBinary Analysis Platform
Stars: ✭ 1,385 (+1016.94%)
PanopticonA libre cross-platform disassembler.
Stars: ✭ 1,376 (+1009.68%)
AirspyAirSpy - Frida-based tool for exploring and tracking the evolution of Apple's AirDrop protocol implementation on i/macOS, from the server's perspective. Released during BH USA 2019 Training https://www.nowsecure.com/event/advanced-frida-and-radare-a-hackers-delight/
Stars: ✭ 116 (-6.45%)
IdbutilLibrary and tool for reading IDApro databases.
Stars: ✭ 100 (-19.35%)
KeystoneKeystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
Stars: ✭ 1,654 (+1233.87%)
WechatspellbookWechat Spellbook 是一个使用Kotlin编写的开源微信插件框架,底层需要 Xposed 或 VirtualXposed 等Hooking框架的支持,而顶层可以轻松对接Java、Kotlin、Scala等JVM系语言。让程序员能够在几分钟内编写出简单的微信插件,随意揉捏微信的内部逻辑。
Stars: ✭ 1,584 (+1177.42%)
Fridahooker由于工作原因接触纯App安全比较少了所以项目处于咕咕咕状态 // Android Frida GUI Manager; Android 图形化Frida管理器
Stars: ✭ 101 (-18.55%)
GamemaniptutorialA tutorial for manipulating the rendering of a game (generally to increase its quality) if you only have a binary available
Stars: ✭ 119 (-4.03%)
CapaThe FLARE team's open-source tool to identify capabilities in executable files.
Stars: ✭ 1,981 (+1497.58%)
Pelock Software Protection And Licensing SdkSoftware copy protection against cracking & reverse engineering with anti-cracking & anti-debugging techniques. Software license key system with time trial options.
Stars: ✭ 109 (-12.1%)
XpcspyBidirectional XPC message interception and more. Powered by Frida
Stars: ✭ 101 (-18.55%)
JebscriptsA set of JEB Python/Java scripts for reverse engineering Android obfuscated code
Stars: ✭ 100 (-19.35%)
NgrevTool for reverse engineering of Angular applications
Stars: ✭ 1,368 (+1003.23%)
Ghidra Gekko Broadway LangGhidra language definition for the Gekko and Broadway CPU variant used in the Nintendo GameCube and Nintendo Wii respectively
Stars: ✭ 98 (-20.97%)
Bin2llvmA binary to LLVM translator
Stars: ✭ 108 (-12.9%)
JremapperRemapping tool for compiled java programs.
Stars: ✭ 97 (-21.77%)
KiewtaiA port of Kaitai to the Hiew hex editor
Stars: ✭ 108 (-12.9%)
PyidbutilA python library for reading IDA pro databases.
Stars: ✭ 98 (-20.97%)
LighthouseA Code Coverage Explorer for Reverse Engineers
Stars: ✭ 1,348 (+987.1%)
CtftoolInteractive CTF Exploration Tool
Stars: ✭ 1,563 (+1160.48%)
FridaandroidtracerA runnable jar that generate Javascript hook script to hook Android classes.
Stars: ✭ 114 (-8.06%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+38640.32%)