There are 64 repositories under frida topic.
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
🔥🔥hooker是一个基于frida实现的逆向工具包。为逆向开发人员提供统一化的脚本包管理方式、通杀脚本、自动化生成hook脚本、内存漫游探测activity和service、firda版JustTrustMe、disable ssl pinning
Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)
《FRIDA操作手册》by @hluwa @r0ysue
Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
Hand-crafted Frida examples
Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...
A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.
FridaContainer 整合了网上流行的和自己编写的常用的 frida 脚本,为逆向工作提效之用。 frida 脚本模块化,Java & Jni Trace。
Frida scripts to directly MitM all HTTPS traffic from a target mobile application
[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
A Frida module to dump, trace or hijack any Il2Cpp application at runtime, without needing the global-metadata.dat file.
Most usable tools for iOS penetration testing
🔐 Run frida-server on boot with Magisk, always up-to-date
A tool that helps you easy trace classes, functions, and modify the return values of methods on iOS platform
The repo contains a series of challenges for learning Frida for Android Exploitation.
基于frida的安卓hook框架,提供了很多frida自身不支持的功能,将hook安卓变成简单便捷,人人都会的事情
🔨 Break Java Reverse Engineering form Memory World!
Bypass Tiktok SSL pinning on Android devices.
《爬虫逆向进阶实战》书籍代码库