dweinstein/awesome-frida

README.md

A curated list of awesome projects, libraries, and tools powered by Frida.

What is Frida?

Frida is Greasemonkey for native apps, or, put in more technical terms, it’s a dynamic code instrumentation toolkit. It lets you inject snippets of JavaScript into native apps that run on Windows, Mac, Linux, iOS and Android.

Frida is an open source software.

More info here.

Table of Contents

Libraries

Projects

Talks & Papers

Powered by Frida

  • Aurora - Web app built on top of Frida
  • CloudSpy - Web app built on top of Frida
  • CryptoShark - Self-optimizing cross-platform code tracer based on dynamic recompilation
  • diff-gui - Web GUI for instrumenting Android
  • LobotomyLobotomy Fork - Android Reverse Engineering Framework & Toolkit
  • Appmon - Runtime Security Testing Framework for iOS, Mac OS X and Android Apps
  • Fridump - A universal memory dumper using Frida
  • frida-extract - Automatically extract and reconstruct a PE file that has been injected using the RunPE method
  • r2frida memory search

Videos

Blog posts

Community

Contributions

Your contributions are always welcome!

If you want to contribute to this list (please do), send me a pull request or contact me @insitusec

Also, if you notice that a listing should be deprecated or replaced:

  • Repository's owner explicitly say that "this library is not maintained".
  • Not committed for long time (2~3 years).

More info on the guidelines

Credits


为您推荐了相关的技术文章:

  1. Back That App Up: Gaining Root on the Lenovo Vibe « Threat Research Blog
  2. Injecting Metasploit Payloads into Android Applications – Manually
  3. Early Warning: ADB.Miner A Mining Botnet Utilizing Android ADB Is Now Rapidly Spreading
  4. Studying APK reverse engineering by breaking the anonymity of BlindSpot app
  5. Analyze Mobile Banking App TLS/SSL Traffic

原文链接: github.com