- Resource About Dynamic Binary Instrumentation and Dynamic Binary Analysis
- DynamoRIO
- IntelPin
- Frida
- Valgrind -> (9)Tools (6)Post
- QBDI -> (1)Tools (6)Post
- ABDI -> (2)Tools (2)Post
- DBA
- Other -> (10)Tools (6)Post
- [1425Star][23d] [C] dynamorio/drmemory Memory Debugger for Windows, Linux, Mac, and Android
- 2016.09 [securitygossip] Practical Memory Checking With Dr. Memory
- 2014.01 [dustri] Memory debugging under Windows with drmemory
- [1265Star][23d] [C] dynamorio/dynamorio Dynamic Instrumentation Tool Platform
- [1394Star][22d] [C] googleprojectzero/winafl A fork of AFL for fuzzing Windows binaries
- [253Star][7m] [C] ampotos/dynstruct Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone
- [123Star][6m] [C++] googleprojectzero/drsancov DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables
- [119Star][5y] [C++] breakingmalware/selfie A Tool to Unpack Self-Modifying Code using DynamoRIO
- [53Star][4y] [C] lgeek/dynamorio_pin_escape Escaping DynamoRIO and Pin
- [37Star][1m] [Py] oddcoder/cutterdrcov DynamoRIO coverage visualization for cutter
- [17Star][3m] [C] firodj/bbtrace Basic Block Trace: DynamoRIO client
- [14Star][1m] [C++] vanhauser-thc/afl-dynamorio run AFL with dynamorio
- [10Star][3y] [C++] atrosinenko/afl-dr Experiment in implementation of an instrumentation for American Fuzzy Lop using DynamoRIO
- [52Star][1y] [Py] cisco-talos/dyndataresolver Dynamic Data Resolver (DDR) IDA Pro Plug-in
- [20Star][11m] [C++] secrary/findloop find possible encryption/decryption or compression/decompression code
- [7Star][3y] [C++] ncatlin/drgat The DynamoRIO client for rgat
- 2018.07 [topsec] 动态二进制修改(Dynamic Binary Instrumentation)入门:Pin、DynamoRIO、Frida
- 2016.08 [n0where] Dynamic Instrumentation Tool Platform: DynamoRIO
- 2012.10 [redplait] building dynamorio
- 2011.06 [redplait] dynamorio
- 2019.10 [freebuf] DrSemu:基于动态行为的恶意软件检测与分类工具
- 2019.06 [freebuf] Functrace:使用DynamoRIO追踪函数调用
- 2019.01 [360] 深入浅出——基于DynamoRIO的strace和ltrace
- 2018.08 [n0where] Dynamic API Call Tracer for Windows and Linux Applications: Drltrace
- 2017.04 [pediy] [原创]通过Selife学习使用DynamoRIO动态插桩
- 2016.11 [360] “Selfie”:利用DynamoRIO实现自修改代码自动脱壳的神器
- 2017.11 [SECConsult] The Art of Fuzzing - Demo 10: In-memory Fuzzing HashCalc using DynamoRio
- 2017.11 [SECConsult] The Art of Fuzzing - Demo 6: Extract Coverage Information using DynamoRio
- [427Star][5y] [C++] jonathansalwan/pintools Pintool example and PoC for dynamic binary analysis
- [306Star][4m] [C] vusec/vuzzer depends heavily on a modeified version of DataTracker, which in turn depends on LibDFT pintool.
- [148Star][6y] [C++] f-secure/sulo Dynamic instrumentation tool for Adobe Flash Player built on Intel Pin
- [131Star][8m] [C++] hasherezade/tiny_tracer A Pin Tool for tracing API calls etc
- [67Star][3y] [C++] m000/dtracker DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.
- [60Star][3y] [C++] hasherezade/mypintools Tools to run with Intel PIN
- [50Star][11m] [C++] angorafuzzer/libdft64 libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)
- [48Star][7y] [C++] cr4sh/code-coverage-analysis-tools Code coverage analysis tools for the PIN Toolkit
- [42Star][4y] [C++] corelan/pin Collection of pin tools
- [36Star][4y] [C++] paulmehta/ablation Augmenting Static Analysis Using Pintool: Ablation
- [30Star][5y] [C++] 0xddaa/pin Use Intel Pin tools to analysis binary.
- [30Star][7y] [C++] jingpu/pintools
- [28Star][1y] [C++] fdiskyou/winalloctracer Pintool that logs and tracks calls to RtlAllocateHeap, RtlReAllocateHeap, RtlFreeHeap, VirtualAllocEx, and VirtualFreeEx.
- [26Star][5m] [C++] boegel/mica a Pin tool for collecting microarchitecture-independent workload characteristics
- [22Star][6y] [C++] jbremer/pyn Awesome Python bindings for Pintool
- [18Star][7m] bash-c/pin-in-ctf 使用intel pin来求解一部分CTF challenge
- [13Star][3y] [C++] netspi/pin Intel pin tools
- [6Star][2y] [C++] spinpx/afl_pin_mode Yet another AFL instrumentation tool implemented by Intel Pin.
- [0Star][6m] [Makefile] barkhat26/pintool-template PinTool template for Intel Pin 3.11 compatible with VS2019
- [971Star][1y] [Py] gaasedelen/lighthouse Code Coverage Explorer for IDA Pro & Binary Ninja
- Also In Section: Frida->Tools->Interact With Other Tools |
- coverage-frida 使用Frida收集信息
- coverage-pin 使用Pin收集覆盖信息
- 插件 支持IDA和BinNinja
- [134Star][1y] [Py] carlosgprado/jarvis "Just Another ReVersIng Suite" or whatever other bullshit you can think of
- [122Star][5y] [C++] zachriggle/ida-splode Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation
- [118Star][2y] [C++] 0xphoenix/mazewalker Toolkit for enriching and speeding up static malware analysis
- [104Star][6m] [Java] 0ffffffffh/dragondance Binary code coverage visualizer plugin for Ghidra
- Ghidra插件
- coverage-pin 使用Pin收集信息
- [93Star][8y] [C] neuroo/runtime-tracer Dynamic tracing for binary applications (using PIN), IDA plugin to visualize and interact with the traces
- [44Star][3y] [Batchfile] maldiohead/idapin plugin of ida with pin
- [17Star][1y] [C++] agustingianni/instrumentation Collection of tools implemented using pintools aimed to help in the task of reverse engineering.
- 2019.10 [HackersOnBoard] Black Hat USA 2016 Pindemonium A DBI Based Generic Unpacker for Windows Executable
- 2019.08 [codingvision] Hot Patching C/C++ Functions with Intel Pin
- 2017.07 [gironsec] Intel PIN, Cheatz, Hax, And Detection Part 2
- 2017.05 [netspi] Dynamic Binary Analysis with Intel Pin
- 2016.12 [gironsec] Intel PIN, Cheatz, Hax, And Detection Part 1
- 2016.09 [zubcic] Fixing Intel PIN Visual Studio project files
- 2014.11 [portcullis] Using Intel Pin tools for binary instrumentation
- [4721Star][1m] [Makefile] frida/frida Clone this repo to build Frida
- [2176Star][22d] [Py] sensepost/objection runtimemobile exploration
- [1306Star][4m] [Vue] chaitin/passionfruit [WIP] Crappy iOS app analyzer
- [1259Star][3m] dweinstein/awesome-frida A curated list of Frida resources
- [1256Star][2m] [JS] alonemonkey/frida-ios-dump pull decrypted ipa from jailbreak device
- [988Star][4m] [HTML] hookmaster/frida-all-in-one FRIDA操作手册
- [926Star][7m] [JS] dpnishant/appmon an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on Frida.
- [696Star][2m] [Py] igio90/dwarf Full featured multi arch/os debugger built on top of PyQt5 and frida
- [643Star][1m] [JS] nccgroup/house A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
- [564Star][2m] [JS] iddoeldor/frida-snippets Hand-crafted Frida examples
- [550Star][7m] [JS] wooyundota/droidsslunpinning Android certificate pinning disable tools
- [510Star][26d] [JS] lyxhh/lxhtoolhttpdecrypt Simple Android/iOS protocol analysis and utilization tool
- [440Star][1y] [Py] dstmath/frida-unpack unpack script based on frida
- [432Star][2y] [JS] 0xdea/frida-scripts A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.
- [431Star][2m] [C] frida/frida-python Frida Python bindings
- [405Star][2y] [C++] vah13/extracttvpasswords tool to extract passwords from TeamViewer memory using Frida
- [374Star][2m] [JS] chichou/bagbak Yet another frida based iOS dumpdecrypted, works on iOS 13 with checkra1n and supports decrypting app extensions
- [327Star][1m] [C] frida/frida-core Frida core library intended for static linking into bindings
- [326Star][1y] [C] smartdone/dexdump 快速脱一代壳的xposed插件
- [326Star][23d] [JS] smartdone/frida-scripts frida scripts
- [320Star][5y] [C++] frida/cryptoshark Self-optimizing cross-platform code tracer based on dynamic recompilation
- [307Star][10m] [Py] nightbringer21/fridump A universal memory dumper using Frida
- [277Star][2y] [Py] antojoseph/frida-android-hooks Lets you hook Method Calls in Frida ( Android )
- [271Star][23d] [JS] frenchyeti/dexcalibur Dynamic binary instrumentation tool designed for Android application and powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
- [251Star][2y] [Py] igio90/frick aka the first debugger built on top of frida
- [248Star][23d] [JS] we11cheng/wcshadowrocket iOS Shadowrocket(砸壳重签,仅供参考,添加节点存在问题)。另一个fq项目potatso源码参见:
- [238Star][1m] [JS] andreafioraldi/frida-fuzzer This experimetal fuzzer is meant to be used for API in-memory fuzzing.
- [234Star][1m] [C] frida/frida-gum Low-level code instrumentation library used by frida-core
- [208Star][23d] [JS] xiaokanghub/frida-android-unpack this unpack script for Android O and Android P
- [203Star][2y] [ObjC] alonemonkey/dumpdecrypted Dumps decrypted mach-o files from encrypted applications、framework or app extensions.
- [200Star][7m] [C] nowsecure/frida-cycript Cycript fork powered by Frida.
- [185Star][2m] [TS] chame1eon/jnitrace A Frida based tool that traces usage of the JNI API in Android apps.
- [179Star][24d] [JS] interference-security/frida-scripts Frida Scripts
- [171Star][3m] [C++] samyk/frisky Instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS and macOS
- [158Star][30d] [JS] fuzzysecurity/fermion Fermion, an electron wrapper for Frida & Monaco.
- [142Star][3y] [JS] as0ler/frida-scripts Repository including some useful frida script for iOS Reversing
- [137Star][10m] enovella/r2frida-wiki This repo aims at providing practical examples on how to use r2frida
- [125Star][3y] [JS] antojoseph/diff-gui GUI for Frida -Scripts
- [123Star][2y] [Java] brompwnie/uitkyk Android Frida库, 用于分析App查找恶意行为
- [115Star][2m] [C++] frida/frida-node Frida Node.js bindings
- [114Star][2y] [C] b-mueller/frida-detection-demo Some examples for detecting frida on Android
- [110Star][11m] [Py] rootbsd/fridump3 A universal memory dumper using Frida for Python 3
- [106Star][23d] [JS] thecjw/frida-android-scripts Some frida scripts
- [104Star][2m] [JS] frida/frida-java-bridge Java runtime interop from Frida
- [99Star][2y] [Java] piasy/fridaandroidtracer A runnable jar that generate Javascript hook script to hook Android classes.
- [95Star][5m] [Py] demantz/frizzer Frida-based general purpose fuzzer
- [93Star][7m] [TS] nowsecure/airspy AirSpy - Frida-based tool for exploring and tracking the evolution of Apple's AirDrop protocol implementation on i/macOS, from the server's perspective. Released during BH USA 2019 Training
- [91Star][23d] [TS] chichou/vscode-frida WIP
- [90Star][25d] [C] grimm-co/notquite0dayfriday This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.
- [90Star][3y] [JS] oalabs/frida-extract Frida.re based RunPE (and MapViewOfSection) extraction tool
- [89Star][3y] [JS] oalabs/frida-wshook Script analysis tool based on Frida.re
- [88Star][2y] [Py] mind0xp/frida-python-binding Easy to use Frida python binding script
- [82Star][6m] [C] oleavr/ios-inject-custom Example showing how to use Frida for standalone injection of a custom payload
- [81Star][7m] [JS] frida/frida-presentations Public presentations given on Frida at conferences
- [79Star][11m] wufengxue/android-reverse 安卓逆向工具汇总
- [78Star][4m] [JS] andreafioraldi/frida-js-afl-instr An example on how to do performant in-memory fuzzing with AFL++ and Frida
- [75Star][4y] [Py] antojoseph/diff-droid Various Scripts for Mobile Pen-testing with Frida
- [74Star][9m] [PHP] vlucas/pikirasa PKI public/private RSA key encryption using the OpenSSL extension
- [69Star][5m] [Py] hamz-a/jeb2frida Automated Frida hook generation with JEB
- [67Star][25d] [Py] lich4/personal_script 010Editor/BurpSuite/Frida/IDA tools and scripts collection
- 010Editor 010Editor scripts
- ParamChecker Burp插件
- Frida Frida Scripts
- IDA IDA Scripts
- IDA-read_unicode.py When there is chinese unicode character in programe, due to python's shortage, ida could not recongnized them correctly, it's what my script just do
- IDA-add_xref_for_macho When you deal with macho file with ida, you'll find out that it's not easy to find Objc-Class member function's caller and callee, (because it use msgSend instead of direct calling convention), so we need to make some connection between the selector names and member function pointers, it's what my script just do
- IDA-add_info_for_androidgdb When you debug android with IDA and gdbserver, you'd find that the module list and segment is empy, while we can read info from /proc/[pid]/,
- IDA-trace_instruction this script is to trace instruction stream in one run
- IDA-detect_ollvm this script is to detect ollvm and fix it in some extent, apply to android and ios
- IDA-add_block_for_macho this script is used to analysis block structure exist in macho file, target NSConcreteStackBlock/NSConcreteGlobalBlock currently, also contain some wonderful skills
- [65Star][2m] [C] darvincisec/detectfrida Detect Frida for Android
- [59Star][2y] [Py] attackercan/teamviewer-dumper Dump TeamViewer ID and password from memory. Works much better than other tools.
- [57Star][10m] [JS] hamz-a/frida-android-libbinder PoC Frida script to view Android libbinder traffic
- [56Star][1m] [Py] frida/frida-tools Frida CLI tools
- [55Star][23d] [Java] igio90/fridaandroidinjector Inject frida agents on local processes through an Android app
- [54Star][9m] [Py] bkerler/oppo_decrypt Oppo/Oneplus .ops Firmware decrypter
- [54Star][1m] [Py] hamz-a/frida-android-helper Frida Android utilities
- [52Star][1y] feicong/zsxq_archives 【软件安全与知识星球】精华文章列表
- [52Star][8m] [TS] igio90/hooah-trace Instructions tracing powered by frida
- [50Star][1y] [JS] fortiguard-lion/frida-scripts
- [50Star][1y] [JS] maltek/swift-frida Frida library for interacting with Swift programs.
- [48Star][7m] [JS] nowsecure/frida-trace Trace APIs declaratively through Frida.
- [47Star][6m] [Swift] frida/frida-swift Frida Swift bindings
- [46Star][3y] [Py] ikoz/jdwp-lib-injector
- [46Star][10m] [C] sensepost/frida-windows-playground A collection of Frida hooks for experimentation on Windows platforms.
- [43Star][2y] [HTML] digitalinterruption/fridaworkshop Break Apps with Frida workshop material
- [43Star][25d] [TS] oleavr/frida-agent-example Example Frida agent written in TypeScript
- [42Star][3m] [JS] frida/frida-compile Compile a Frida script comprised of one or more Node.js modules
- [40Star][2y] [Py] agustingianni/memrepl a frida based script that aims to help a researcher in the task of exploitation of memory corruption related bugs
- [39Star][1m] [CSS] frida/frida-website Frida's website
- [35Star][5m] [Py] dmaasland/mcfridafee
- [35Star][2m] [C++] taviso/sharapi Simpsons: Hit & Run JavaScript API
- [31Star][2m] [JS] fsecurelabs/android-keystore-audit
- [30Star][1y] [JS] ioactive/bluecrawl Frida (Android) Script for extracting bluetooth information
- [30Star][8m] [TS] igio90/frida-onload Frida module to hook module initializations on android
- [29Star][7m] [Java] dineshshetty/fridaloader A quick and dirty app to download and launch Frida on Genymotion
- [29Star][25d] [C++] frida/v8 Frida depends on V8
- [28Star][2y] [JS] versprite/engage Tools and Materials for the Frida Engage Blog Series
- [27Star][2y] [Py] androidtamer/frida-push Wrapper tool to identify the remote device and push device specific frida-server binary.
- [27Star][6m] [C++] frida/frida-clr Frida .NET bindings
- [27Star][2m] [JS] nowsecure/frida-uikit Inspect and manipulate UIKit-based GUIs through Frida.
- [26Star][2m] [TS] chame1eon/jnitrace-engine Engine used by jnitrace to intercept JNI API calls.
- [25Star][3m] [TS] woza-lab/woza [Deprecated]Dump application ipa from jailbroken iOS based on frida. (Node edition)
- [25Star][2m] [Shell] virb3/magisk-frida
- [21Star][4y] [JS] dweinstein/node-frida-contrib frida utility-belt
- [21Star][28d] [JS] iddoeldor/mplus Intercept android apps based on unity3d (Mono) using Frida
- [21Star][7m] [JS] nowsecure/frida-uiwebview Inspect and manipulate UIWebView-hosted GUIs through Frida.
- [20Star][5y] [JS] frida/aurora Proof-of-concept web app built on top of Frida
- [19Star][2y] [Py] notsosecure/dynamic-instrumentation-with-frida Dynamic Instrumentation with Frida
- [19Star][7m] [JS] nowsecure/frida-screenshot Grab screenshots using Frida.
- [19Star][7m] [JS] freehuntx/frida-mono-api All the mono c exports, ready to be used in frida!
- [19Star][3m] [JS] cynops/frida-hooks
- [18Star][3m] [Py] igio90/fridaandroidtracer Android application tracer powered by Frida
- [18Star][23d] [Py] bannsec/revenge REVerse ENGineering Environment
- [16Star][7m] [JS] nowsecure/frida-fs Create a stream from a filesystem resource.
- [14Star][2m] [Java] igio90/snetkiller InHouse safetynet killer
- [14Star][4m] [JS] woza-lab/woza-desktop [Deprecated]Desktop edition of command line tool woza
- [13Star][5m] [JS] freehuntx/frida-inject This module allows you to easily inject javascript using frida and frida-load.
- [12Star][1y] [JS] andreafioraldi/taint-with-frida just an experiment
- [12Star][5y] [JS] frida/cloudspy Proof-of-concept web app built on top of Frida
- [11Star][7m] [JS] nowsecure/mjolner Cycript backend powered by Frida.
- [11Star][1y] [JS] rubaljain/frida-jb-bypass Frida script to bypass the iOS application Jailbreak Detection
- [10Star][2y] [JS] random-robbie/frida-docker Dockerised Version of Frida
- [10Star][2m] [Py] melisska/neomorph Frida Python Tool
- [9Star][5m] [JS] lmangani/node_ssl_logger Decrypt and log process SSL traffic via Frida Injection
- [9Star][5m] [Py] c3r34lk1ll3r/binrida Plugin for Frida in Binary Ninja
- [8Star][2y] [Py] tinyniko/tweakdev WOWOWOWOOWOWOWOOWOOWOW
- [7Star][5m] [C++] jaiverma/headshot headshot: Trainer(aimbot and esp) for Assault Cube on macOS
- [7Star][7m] [JS] nowsecure/frida-panic Easy crash-reporting for Frida-based applications.
- [6Star][7m] [JS] davuxcom/frida-scripts Inject JS and C# into Windows apps, call COM and WinRT APIs
- [6Star][3y] [JS] frida/frida-load Load a Frida script comprised of one or more Node.js modules
- [6Star][4m] [TS] nowsecure/frida-remote-stream Create an outbound stream over a message transport.
- [6Star][1y] [JS] eybisi/fridascripts
- [4Star][7m] [JS] nowsecure/frida-memory-stream Create a stream from one or more memory regions.
- [4Star][3m] [JS] sipcapture/hepjack.js Elegantly Sniff Forward-Secrecy TLS/SIP to HEP at the source using Frida
- [3Star][2m] [Py] margular/frida-skeleton This repository is supposed to define infrastructure of frida on hook android including some useful functions
- [3Star][2y] [JS] myzhan/frida-examples Examples of using frida.
- [2Star][1y] rohanbagwe/kick-off-owasp_webapp_security_vulnerabilities Want to keep your Web application from getting hacked? Here's how to get serious about secure apps. So let's do it! Open Friday, Aug 2016 - Presentation Notes.
- [1Star][1y] [JS] ddurando/frida-scripts
- [971Star][1y] [Py] gaasedelen/lighthouse Code Coverage Explorer for IDA Pro & Binary Ninja
- Also In Section: IntelPin->Tools->Interact With Other Tools |
- coverage-frida 使用Frida收集信息
- coverage-pin 使用Pin收集覆盖信息
- 插件 支持IDA和BinNinja
- [609Star][1y] [Java] federicodotta/brida The new bridge between Burp Suite and Frida!
- [414Star][1m] [JS] nowsecure/r2frida Radare2 and Frida better together.
- [131Star][3y] [Py] friedappleteam/frapl a reverse engineering framework created to simplify dynamic instrumentation with Frida
- [86Star][5y] [Py] techbliss/frida_for_ida_pro plugin for ida pro thar uses the Frida api
- [35Star][2m] [CSS] nowsecure/r2frida-book The radare2 + frida book for Mobile Application assessment
- [8Star][5m] [Py] c3r34lk1ll3r/binrida Plugin for Frida in Binary Ninja
- 2019.12 [sarang6489] Root Detection Bypass With Frida.
- 2019.12 [xakcop] Cloning RSA tokens with Frida
- 2019.11 [riusksk] Frida框架在Fuzzing中的应用
- 2019.11 [securify] Android Frida hooking: disabling FLAG_SECURE
- 2019.10 [freebuf] 使用Frida绕过Android App的SSL Pinning
- 2019.10 [securify] Automated Frida hook generation with JEB
- 2019.10 [sensepost] mettle your ios with frida
- 2019.09 [freebuf] Dwarf:一款基于Pyqt5和Frida的逆向分析调试工具
- 2019.06 [two06] Fun With Frida
- 2019.05 [nsfocus] 基于Frida进行通信数据“解密”
- 2019.05 [nsfocus] Frida应用基础及APP https证书验证破解
- 2019.05 [CodeColorist] Trace child process with frida on macOS
- 2019.05 [360] FRIDA脚本系列(四)更新篇:几个主要机制的大更新
- 2019.04 [ved] Hail Frida!! The Universal SSL pinning bypass for Android.
- 2019.04 [sensepost] recreating known universal windows password backdoors with Frida
- 2019.04 [securify] Frida Android libbinder
- 2019.03 [360] FRIDA脚本系列(三)超神篇:百度AI“调教”抖音AI
- 2019.03 [securityinnovation] Setting up Frida Without Jailbreak on the Latest iOS 12.1.4 Device
- 2019.02 [nowsecure] Frida 12.3 Debuts New Crash Reporting Feature
- 2019.01 [fuzzysecurity] Application Introspection & Hooking With Frida
- 2019.01 [fuping] 安卓APP测试之HOOK大法-Frida篇
- 2019.01 [360] FRIDA脚本系列(二)成长篇:动静态结合逆向WhatsApp
- 2019.01 [pediy] [原创]介召几个frida在安卓逆向中使用的脚本以及延时Hook手法
- 2018.12 [360] FRIDA脚本系列(一)入门篇:在安卓8.1上dump蓝牙接口和实例
- 2018.12 [pediy] [原创]CVE-2017-4901 VMware虚拟机逃逸漏洞分析【Frida Windows实例】
- 2018.12 [freebuf] 一篇文章带你领悟Frida的精髓(基于安卓8.1)
- 2018.12 [pediy] [原创] Frida操作手册-Android环境准备
- 2018.11 [4hou] 使用FRIDA为Android应用进行脱壳的操作指南
- 2018.11 [pediy] [原创]Frida Bypass Android SSL pinning example 1
- 2018.11 [secjuice] Getting Started With Objection + Frida
- 2018.11 [insinuator] Dumping Decrypted Documents from a North Korean PDF Reader
- 2018.11 [BSidesCHS] BSidesCHS 2018: "Hacking Mobile Apps with Frida" by David Coursey
- 2018.11 [freebuf] Frida-Wshook:一款基于Frida.re的脚本分析工具
- 2018.11 [360] 如何使用FRIDA搞定Android加壳应用
- 2018.11 [ioactive] Extracting Bluetooth Metadata in an Object’s Memory Using Frida
- 2018.11 [fortinet] How-to Guide: Defeating an Android Packer with FRIDA
- 2018.10 [PancakeNopcode] r2con2018 - Analyzing Swift Apps With swift-frida and radare2 - by Malte Kraus
- 2018.10 [serializethoughts] Bypassing Android FLAG_SECURE using FRIDA
- 2018.09 [pediy] [原创]使用frida来hook加固的Android应用的java层
- 2018.09 [freebuf] Frida在爆破Windows程序中的应用
- 2018.08 [pediy] [翻译]通过破解游戏学习Frida基础知识
- 2018.07 [pediy] [原创]在windows搭建frida hook环境碰到问题
- 2018.07 [CodeColorist] 《基于 FRIDA 的全平台逆向分析》课件
- 2018.07 [serializethoughts] Frida, Magisk and SELinux
- 2018.07 [pediy] [翻译]在未root的设备上使用frida
- 2018.07 [pediy] [原创]进阶Frida--Android逆向之动态加载dex Hook(三)(下篇)
- 2018.07 [pediy] [原创]进阶Frida--Android逆向之动态加载dex Hook(三)(上篇)
- 2018.06 [pediy] [原创]frida源码阅读之frida-java
- 2018.06 [4hou] 利用Frida打造ELF解析器
- 2018.06 [pediy] [原创]关于android 微信 frida 使用技巧
- 2018.06 [pediy] [原创]初识Frida--Android逆向之Java层hook (二)
- 2018.06 [pediy] [原创]初识Frida--Android逆向之Java层hook (一)
- 2018.05 [pediy] [原创]Frida从入门到入门—安卓逆向菜鸟的frida食用说明
- 2018.05 [aliyun] Frida.Android.Practice (ssl unpinning)
- 2018.05 [infosecinstitute] Frida
- 2018.03 [pediy] [翻译]使用 Frida 逆向分析 Android 应用与 BLE 设备的通信
- 2018.03 [freebuf] Frida之Pin码破解实验
- 2018.02 [pentestpartners] Reverse Engineering BLE from Android apps with Frida
- 2018.02 [BSidesLeeds] Prototyping And Reverse Engineering With Frida by Jay Harris
- 2018.02 [libnex] Hunting for hidden parameters within PHP built-in functions (using frida)
- 2017.11 [pediy] [翻译]Frida官方手册中文版
- 2017.10 [pediy] [翻译]利用Frida绕过Certificate Pinning
- 2017.09 [PancakeNopcode] r2con 2017 - Intro to Frida and Dynamic Machine Code Transformations by Ole Andre
- 2017.09 [PancakeNopcode] r2con2017 - r2frida /by @mrmacete
- 2017.09 [pediy] [原创] 如何构建一款像 frida 一样的框架
- 2017.08 [360] 如何利用Frida实现原生Android函数的插桩
- 2017.08 [notsosecure] Instrumenting Native Android Functions using Frida
- 2017.08 [freebuf] Brida:使用Frida进行移动应用渗透测试
- 2017.08 [freebuf] 利用Frida从TeamViewer内存中提取密码
- 2017.08 [360] 联合Frida和BurpSuite的强大扩展--Brida
- 2017.08 [4hou] Brida:将frida与burp结合进行移动app渗透测试
- 2017.07 [mediaservice] Brida: Advanced Mobile Application Penetration Testing with Frida
- 2017.07 [360] 使用Frida绕过Android SSL Re-Pinning
- 2017.07 [mediaservice] Universal Android SSL Pinning bypass with Frida
- 2017.07 [4hou] objection - 基于 Frida 的 iOS APP Runtime 探测工具
- 2017.07 [koz] Library injection for debuggable Android apps
- 2017.06 [360] 利用FRIDA攻击Android应用程序(四)
- 2017.06 [fitblip] Frida CodeShare: Building a Community of Giants
- 2017.05 [freebuf] 如何在iOS应用程序中用Frida来绕过“越狱检测”?
- 2017.05 [4hou] Android APP破解利器Frida之反调试对抗
- 2017.05 [360] 如何使用Frida绕过iOS应用的越狱检测
- 2017.05 [4hou] Frida:一款可以绕过越狱检测的工具
- 2017.05 [pediy] [翻译]多种特征检测 Frida
- 2017.05 [attify] Bypass Jailbreak Detection with Frida in iOS applications
- 2017.05 [pediy] [翻译]OWASP iOS crackme 的教程:使用Frida来解决
- 2017.05 [attify] Bypass Jailbreak Detection with Frida in iOS applications
- 2017.05 [pediy] [翻译]用Frida来hack 安卓应用III—— OWASP UNCRACKABLE 2
- 2017.05 [360] 利用FRIDA攻击Android应用程序(三)
- 2017.04 [codemetrix] Hacking Android apps with FRIDA III - OWASP UnCrackable 2
- 2017.04 [4hou] 安卓APP破解利器Frida之破解实战
- 2017.04 [4hou] 安卓APP破解利器之FRIDA
- 2017.04 [koz] Using Frida on Android without root
- 2017.04 [pediy] [翻译]使用Frida来hack安卓APP(二)-crackme
- 2017.04 [fuping] Android HOOK 技术之Frida的初级使用
- 2017.03 [pediy] [翻译] 使用Frida来hack安卓APP(一)
- 2017.03 [360] 利用FRIDA攻击Android应用程序(二)
- 2017.03 [360] 利用FRIDA攻击Android应用程序(一)
- 2017.03 [notsosecure] Pentesting Android Apps Using Frida
- 2017.03 [codemetrix] Hacking Android apps with FRIDA II - Crackme
- 2017.03 [codemetrix] Hacking Android apps with FRIDA I
- 2017.01 [freebuf] 使用Frida配合Burp Suite追踪API调用
- 2016.09 [PancakeNopcode] r2con 2016 -- oleavr - r2frida
- 2016.09 [n0where] RunPE Extraction Tool: FridaExtract
- 2015.11 [crackinglandia] Anti-instrumentation techniques: I know you’re there, Frida!
- 2014.08 [3xp10it] frida用法
- 2014.08 [3xp10it] frida用法
- 2014.08 [3xp10it] frida开启ios app签名服务
- 2014.02 [silentsignal] From Read to Domain Admin – Abusing Symantec Backup Exec with Frida
- [188Star][26d] [Py] angr/pyvex Python bindings for Valgrind's VEX IR.
- [152Star][1m] [C] wmkhoo/taintgrind A taint-tracking plugin for the Valgrind memory checking tool
- [128Star][9y] [C] agl/ctgrind Checking that functions are constant time with Valgrind
- [35Star][8m] [C] pmem/valgrind Enhanced Valgrind for Persistent Memory
- [29Star][11y] [C] dmolnar/smartfuzz Valgrind extension for whitebox fuzz testing
- [7Star][2m] [C] yugr/valgrind-preload LD_PRELOAD-able library which runs all spawned processes under Valgrind.
- [6Star][1m] [C] kristerw/deadstores A Valgrind tool for finding redundant loads/stores
- [0Star][2y] [C] daveti/valgrind Valgrind hacking from daveti
- [0Star][2y] [C] daveti/valtrap valgrind trapdoor
- 2018.07 [davejingtian] Hacking Valgrind
- 2017.03 [csyssec] 如何使用Valgrind memcheck工具进行C/C++的内存漏洞检测
- 2015.05 [Roland] 使用Valgrind找出Android中Native程序内存泄露问题
- 2012.08 [dndxhej] linux下valgrind的使用概述
- 2010.07 [jinzhuojun] 性能优化工具gprof & 内存检测工具Valgrind 用法
- 2008.06 [kesalin] Valgrind--Linux下的内存调试和代码解剖工具
- [589Star][1y] [C++] qbdi/qbdi A Dynamic Binary Instrumentation framework based on LLVM.
- 2019.09 [quarkslab] QBDI 0.7.0
- 2019.07 [freebuf] 教你如何使用QBDI动态二进制检测框架
- 2019.06 [quarkslab] Android Native Library Analysis with QBDI
- 2018.01 [quarkslab] Slaying Dragons with QBDI
- 2018.01 [pentesttoolz] QBDI – QuarkslaB Dynamic binary Instrumentation
- 2018.01 [n0where] QuarkslaB Dynamic binary Instrumentation: QBDI
- [1057Star][5y] [C] crmulliner/adbi Android Dynamic Binary Instrumentation Toolkit
- [429Star][4y] [Makefile] mindmac/androideagleeye An Xposed and adbi based module which is capable of hooking both Java and Native methods targeting Android OS.
- 2014.06 [Roland] Android平台下hook框架adbi的研究(下)
- 2014.06 [Roland] Android平台下hook框架adbi的研究(上)
- [1433Star][24d] [C++] jonathansalwan/triton DBA framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a dynamic taint engine, AST representations of the x86, x86-64 and AArch64 Instructions Set Architecture (ISA), SMT simplification passes, an SMT solver interface and, the last but not least, Python bindings.
- [61Star][3y] [Py] cifasis/nosy-newt Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton
- [24Star][1y] [Py] cosine0/amphitrite Symbolic debugging tool using JonathanSalwan/Triton
- [24Star][7m] [Py] jonathansalwan/x-tunnel-opaque-predicates IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.
- [17Star][5m] [Py] macaron-et/wasabi-aeg Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.
- [2Star][5m] [Pascal] pigrecos/triton4delphi The Triton - Dynamic Binary Analysis (DBA) framework - by JonathanSalwan binding for Delphi
- 2019.05 [aliyun] Triton 学习 - pintool 篇
- 2019.05 [aliyun] Triton 学习
- 2018.05 [360] DEFCON CHINA议题解读 | Triton和符号执行在 GDB 上
- 2018.02 [HITCON] [HITCON CMT 2017] R0D202 - 陳威伯 - Triton and Symbolic execution on GDB
- 2017.09 [PancakeNopcode] r2con2017 - Pimp my Triton
- 2017.09 [quarkslab] Mistreating Triton
- 2017.04 [0x48] Triton学习笔记(三)
- 2017.04 [0x48] Triton学习笔记(三)
- 2017.04 [0x48] Triton学习笔记(二)
- 2017.04 [0x48] Triton学习笔记(二)
- 2017.04 [0x48] Triton学习笔记(一)
- 2017.04 [0x48] Triton学习笔记(一)
- 2015.06 [quarkslab] Triton under the hood
- [1867Star][26d] [Py] trailofbits/manticore Symbolic execution tool
- [42Star][1m] [Py] trailofbits/manticore-examples Example Manticore scripts
- 2020.01 [trailofbits] Symbolically Executing WebAssembly in Manticore
- 2019.07 [arxiv] [1907.03890] Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts
- 2019.06 [trailofbits] Announcing Manticore 0.3.0
- 2019.01 [trailofbits] Symbolic Path Merging in Manticore
- 2017.06 [n0where] Dynamic Binary Analysis Tool: Manticore
- 2017.05 [4hou] Manticore:次世代二进制分析工具
- [644Star][1y] [Go] lunixbochs/usercorn dynamic binary analysis via platform emulation
- [50Star][1y] [Py] hrkfdn/deckard Deckard performs static and dynamic binary analysis on Android APKs to extract Xposed hooks
- 2013.03 [guidovranken] Dynamic binary analysis using myrrh
- [272Star][4y] [C] samsung/adbi Android Dynamic Binary Instrumentation tool for tracing Android native layer
- [187Star][2y] [C++] sidechannelmarvels/tracer Set of Dynamic Binary Instrumentation and visualization tools for execution traces.
- [173Star][1m] [C] beehive-lab/mambo ARM运行时二进制文件修改工具,低耗版。
- [109Star][2y] [C++] joxeankoret/membugtool A DBI tool to discover heap memory related bugs
- [77Star][3y] [Py] carlosgprado/brundlefuzz BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.
- [71Star][22d] [Py] birchjd/piobdii ODBII graphic interface on a Raspberry Pi computer, using an ELM327 Bluetooth/USB device. Read and display engine data, OBDII Trouble Codes & Descriptions Using Python. YouTube video:
- [60Star][2y] [C] zhechkoz/pwin Security Evaluation of Dynamic Binary Instrumentation Engines
- [36Star][2y] [C++] fdiskyou/dbi Files for
- [18Star][7y] [C] pleed/pyqemu Dynamic binary instrumentation based crypto detection framework. Implementation of
- [6Star][4y] [C++] crackinglandia/exait-plugins Anti-Dynamic binary instrumentation plugins for eXait (
- 2018.08 [4hou] 动态二进制插桩的原理和基本实现过程(一)
- 2018.07 [deniable] Dynamic Binary Instrumentation Primer
- 2017.11 [rootedconmadrid] Ricardo J. Rodríguez - Mejora en el Proceso de Desempacado usando Técnicas DBI [RootedCON 2012]
- 2017.05 [yurichev] 30-May-2017: Using PIN DBI for XOR interception
- 2013.12 [corelan] Using DBI for solving Reverse Engineering 101 – Newbie Contest from eLearnSecurity
- 2012.04 [talosintelligence] Prototyping Mitigations with DBI Frameworks
Contents auto exported by Our System, please raise Issue if you have any question.