Frida
An anti detection version frida-server for android.
🔥🔥hooker是一个基于frida实现的逆向工具包。为逆向开发人员提供统一化的脚本包管理方式、通杀脚本、自动化生成hook脚本、内存漫游探测activity和service、firda版JustTrustMe、disable ssl pinning
🤖 The most powerful Android RPA framework, the next generation of mobile automation robots.
Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
Full featured multi arch/os debugger built on top of PyQt5 and frida
A Frida based tool that traces usage of the JNI API in Android apps.
A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.
Binary instrumentation framework based on FRIDA
[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods…
Inject frida agents on local processes through an Android app
Generic Script To Bypass Some AntiFrida Checks
Small Apps As PoC to Detect Frida With Frida
Generic Frida Script To Bypass Root Detection
Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.
PoC Frida script to view Android libbinder traffic
A frida script for bypass common root detection,the collection of detection methods is still improving!
Engine used by jnitrace to intercept JNI API calls.
A couple of methods for detecting Frida on Android.
Frida module to hook module initializations on android
FridaContainer 整合了网上流行的和自己编写的常用的 frida 脚本,为逆向工作提效之用。 frida 脚本模块化,Java & Jni Trace。
Script to quickly hook natives call to JNI in Android