soviet1942's Stars
0cyn/ktool
pip install k2l | Mach-O + Obj-C analysis TUI / CLI kit and library. Zero compiled deps, runs anywhere with a python interpreter.
HangZhouCat/ReaverAPKTools
逆向APK工具
frida/frida-python
Frida Python bindings
RikkaApps/Riru
Inject into zygote process
hanbinglengyue/FridaManager
Frida持久化解决方案
asLody/SandHook
Android ART Hook/Native Inline Hook/Single Instruction Hook - support 4.4 - 11.0 32/64 bit - Xposed API Compat
keystone-engine/keypatch
Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
chame1eon/jnitrace
A Frida based tool that traces usage of the JNI API in Android apps.
lasting-yang/frida_hook_libart
Frida hook some jni functions
chame1eon/jnitrace-engine
Engine used by jnitrace to intercept JNI API calls.
gaasedelen/lighthouse
A Coverage Explorer for Reverse Engineers
Naville/WTFJH
One-step iOS binary runtime instrumentation for the lazy ones
aemmitt-ns/radius2
radius2 is a fast binary emulation and symbolic execution framework using radare2
polymorf/findcrypt-yara
IDA pro plugin to find crypto constants (and more)
alphaSeclab/awesome-network-stuff
Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysis/etc。More than 1700 open source tools for now. Post incoming.
nabla-c0d3/ssl-kill-switch2
Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and macOS applications.
Breathleas/iTweak
Awesome tweak about WeChat, Weibo, Aweme, and so on. No more introduce, you know.
yangyss/lldb-trace
A python script .Instruction level tracing tool and block level tracing tool for lldb debugger. First tracing code, then dumping all valid code to file, finally analysing it.
horsicq/XMachOViewer
XMachOViewer is a Mach-O viewer for Windows, Linux and MacOS
LoveSVN/restore-symbol
更新支持swift
tobefuturer/restore-symbol
A reverse engineering tool to restore stripped symbol table for iOS app.
Nododo/HookDouYin
iOS逆向:如何让抖音自动播放下一个视频(懒人癌)
NeoTheCapt/aweme-algorithm
抖音协议中的加解密算法实现
OWASP/owasp-mastg
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
omxcodec/OCMethodTrace
Trace Any Objective-C Method Calls
ptswarm/reFlutter
Flutter Reverse Engineering Framework
MrWQ/vulnerability-paper
收集的文章 https://mrwq.github.io/tools/paper/
Mila432/IPA-to-App-M1
Some info on how to convert an IPA (iOS) to App (M1)
ibireme/YYCategories
A set of useful categories for Foundation and UIKit.
salesforce/ja3
JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.