pierluigicdc's starred repositories
whatsapp-web.js
A WhatsApp client library for NodeJS that connects through the WhatsApp Web browser app
PhoneSploit-Pro
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
frida-gadget
Automated tool for patching APKs to enable the use of Frida gadget by downloading the library and injecting code into the main activity.
Tiktok-SSL-Pinning-Bypass
Bypass Tiktok SSL pinning on Android devices.
AndroidHiddenApiBypass
LSPass: Bypass restrictions on non-SDK interfaces
RestrictionBypass
Android API restriction bypass for all Android Versions
frida-scripts
A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.
owasp-mastg
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
DirtyPipe-Android
Dirty Pipe root exploit for Android (Pixel 6)
KillDefender
A small POC to make defender useless by removing its token privileges and lowering the token integrity
BypassAnti-Virus
免杀姿势学习、记录、复现。
malware-samples
Malware samples, analysis exercises and other interesting resources.
RefleXXion
RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtCreateSection, NtOpenSection and NtMapViewOfSection found in the LdrpThunkSignature array.