📊
RE & For & Crypto
Ctrlk
test
  • About
  • Basic
    • Evasion Techniques
    • Assembler
  • PWN
    • Материалы (эксплоиты с CTF и чьи-то заметки)
    • Теория
    • Tools
  • Tools
    • By Languages
    • Информация о бинарном файле
    • Отладчики
    • Трейсеры
    • Пакеры
    • Fuzzers
    • Editors
    • DBI
    • Sandbox
    • Decompilers & Disassemblers
    • Binary Parsing
    • Steganography
    • Other
    • Обфускаторы
  • Windows
    • ASLR/DEP
    • Различные недокументированные структуры
    • Windows API Hook
  • Firmware
    • OWASP Testing methodology
  • MacOS
    • Как увидеть логи приложения
    • Код ядра
Powered by GitBook
On this page
  1. Tools

DBI

fuzzer on frida https://github.com/demantz/frizzer/tree/master/frizzer

JEB + frida: https://bhamza.me/2019/10/06/Automated-Frida-hook-generation-with-JEB.html https://github.com/Hamz-a/jeb2frida

Frida hooks https://github.com/4ch12dy/xia0FridaScript/tree/master/Android/sample

  • Objection ex: https://blog.securelayer7.net/a-run-time-approach-for-pen-testing-ios-applications-part-ii-objection-in-action/

  • OxyRevEng

  • AppMon

  • JNI trace

  • Frida Python

  • JNI Frida hook

  • House

  • RMS

http://deniable.org/reversing/binary-instrumentationdeniable.org
4MB
frida_nn2019.pdf
PDF
Open
PreviousEditorsNextSandbox

Last updated 5 years ago