📊
RE & For & Crypto
test
Reverse Engineering
Reverse Engineering
  • About
  • Basic
    • Evasion Techniques
    • Assembler
      • IDE
      • Asm Language
  • PWN
    • Материалы (эксплоиты с CTF и чьи-то заметки)
    • Теория
      • Техника Blind ROP
      • Курсы
      • Vulnerabilities
      • Функции
        • C++ memory corruption examples
        • snprintf
        • strncmp
    • Tools
      • ROP
  • Tools
    • By Languages
      • Go
      • Lua
      • Rust
      • Adobe Flash Player Apps (SWF)
    • Информация о бинарном файле
    • Отладчики
    • Трейсеры
    • Пакеры
    • Fuzzers
    • Editors
    • DBI
    • Sandbox
      • PyREBox
    • Decompilers & Disassemblers
      • RetDec
      • Capstone
      • Hopper
      • IDA
        • Some Tips & Tricks
        • IDA Python
      • dnSpy
      • Snowman
      • Analys Go Binaries
      • Ghidra
      • Radare2
    • Binary Parsing
      • LIEF
      • Yara
      • Angr
    • Steganography
    • Other
    • Обфускаторы
  • Windows
    • ASLR/DEP
    • Различные недокументированные структуры
    • Windows API Hook
  • Firmware
    • OWASP Testing methodology
  • MacOS
    • Как увидеть логи приложения
    • Код ядра
Powered by GitBook
On this page
  1. Tools

DBI

PreviousEditorsNextSandbox

Last updated 5 years ago

fuzzer on frida

JEB + frida:

Frida hooks

  • ex:

  • OxyRevEng

https://github.com/demantz/frizzer/tree/master/frizzer
https://bhamza.me/2019/10/06/Automated-Frida-hook-generation-with-JEB.html
https://github.com/Hamz-a/jeb2frida
https://github.com/4ch12dy/xia0FridaScript/tree/master/Android/sample
Objection
https://blog.securelayer7.net/a-run-time-approach-for-pen-testing-ios-applications-part-ii-objection-in-action/
AppMon
JNI trace
Frida Python
JNI Frida hook
House
RMS
http://deniable.org/reversing/binary-instrumentationdeniable.org
4MB
frida_nn2019.pdf
pdf