📊
RE & For & Crypto
search
⌘Ctrlk
test
📊
RE & For & Crypto
  • About
  • Basic
    • Evasion Techniques
    • Assembler
  • PWN
    • Материалы (эксплоиты с CTF и чьи-то заметки)
    • Теория
    • Tools
  • Tools
    • By Languages
    • Информация о бинарном файле
    • Отладчики
    • Трейсеры
    • Пакеры
    • Fuzzers
    • Editors
    • DBI
    • Sandbox
    • Decompilers & Disassemblers
    • Binary Parsing
    • Steganography
    • Other
    • Обфускаторы
  • Windows
    • ASLR/DEP
    • Различные недокументированные структуры
    • Windows API Hook
  • Firmware
    • OWASP Testing methodology
  • MacOS
    • Как увидеть логи приложения
    • Код ядра
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Tools

DBI

fuzzer on frida https://github.com/demantz/frizzer/tree/master/frizzerarrow-up-right

JEB + frida: https://bhamza.me/2019/10/06/Automated-Frida-hook-generation-with-JEB.htmlarrow-up-right https://github.com/Hamz-a/jeb2fridaarrow-up-right

Frida hooks https://github.com/4ch12dy/xia0FridaScript/tree/master/Android/samplearrow-up-right

  • Objectionarrow-up-right ex: https://blog.securelayer7.net/a-run-time-approach-for-pen-testing-ios-applications-part-ii-objection-in-action/arrow-up-right

  • OxyRevEng

  • AppMonarrow-up-right

  • JNI tracearrow-up-right

  • Frida Pythonarrow-up-right

  • JNI Frida hookarrow-up-right

  • Housearrow-up-right

  • RMSarrow-up-right

http://deniable.org/reversing/binary-instrumentationdeniable.orgchevron-right
file-pdf
4MB
frida_nn2019.pdf
PDF
arrow-up-right-from-squareOpen
PreviousEditorschevron-leftNextSandboxchevron-right

Last updated 5 years ago