πŸ”
AppSec & Pentest
Ctrlk
  • Mobile
  • Pentesting Methodology
  • Programming
    • Аналитика
    • iOS
    • Android
    • PWA
    • Hybrid App
    • Π Π΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°Ρ†ΠΈΠΈ
    • AirWatch MDM
    • Π”ΠΈΡΡ‚Ρ€ΠΈΠ±ΡŒΡŽΡ†ΠΈΡ
  • Forensic
    • Bluetooth
    • NFC
    • GSM
    • SIM-cards
    • iOS
    • Android
  • Pentest
    • Уязвимости ΠΈ Атаки
    • ΠšΠ΅ΠΉΡΡ‹
    • Bug Bounty
    • Настройка окруТСния
    • Mitigations
    • Books & Papers
    • Companies & People & Blogs
    • Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Ρ‹ ΠΈ скрипты
  • Reverse Engineering
    • Android
    • iOS
    • Tools
      • frida
        • Установка
        • Frida CLI
        • Запуск скриптов
        • ΠžΠ±Ρ‰ΠΈΠ΅ ΠΊΠΎΠΌΠ°Π½Π΄Ρ‹ (JS API)
        • Frida Projects
        • ΠŸΡ€ΠΈΠΌΠ΅Ρ€Ρ‹
          • ΠœΠ°Ρ‚Π΅Ρ€ΠΈΠ°Π»Ρ‹
          • Android
          • iOS
          • Unity/Mono
          • ΠžΠ±Ρ‰Π΅Π΅
      • objection
      • luject
      • emulators
    • ΠšΠ΅ΠΉΡΡ‹
    • Π‘Ρ‚Π°Ρ‚ΡŒΠΈ
  • Administration
    • Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Ρ‹
Powered by GitBook
On this page

Was this helpful?

  1. Reverse Engineering
  2. Tools
  3. frida
  4. ΠŸΡ€ΠΈΠΌΠ΅Ρ€Ρ‹

Unity/Mono

Inj example: https://www.hypn.za.net/blog/2020/04/19/hacking-unity-games-part-2-manipulating/

other example: https://youtu.be/KeWcZ-Dd6tA https://github.com/kylesmile1103/Learn-Frida

PreviousiOSNextΠžΠ±Ρ‰Π΅Π΅

Last updated 4 years ago

Was this helpful?