AutoDroid
MEDUZA
AutoDroid | MEDUZA | |
---|---|---|
3 | 1 | |
119 | 288 | |
- | - | |
3.7 | 0.0 | |
20 days ago | over 3 years ago | |
Python | Python | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
AutoDroid
- Automating Reverse Engineering Android Apps - Python Tool with ADB, AndroGuard, and Frida integration
- Automating Android App Reverse Engineering - New Python Tool with Frida, ADB, and AndroGuard Integration
- Python tool for automating bulk interactions with Android devices - including Frida, AndroGuard, and ADB support
MEDUZA
What are some alternatives?
Ghost - Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
reFlutter - Flutter Reverse Engineering Framework
DroidDetective - A machine learning malware analysis framework for Android apps.
Instagram-SSL-Pinning-Bypass - Bypass Instagram SSL pinning on Android devices.
GramAddict bot - Completely free and open-source human-like Instagram bot. Powered by UIAutomator2 and compatible with basically any Android device 5.0+ that can run Instagram - real or emulated.
frida - Clone this repo to build Frida
owasp-mastg - The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
WhatsApp-Key-Database-Extractor - The most advanced and complete solution for extracting WhatsApp key/DB from package directory (/data/data/com.whatsapp) without root access.
r2flutch - Tool to decrypt iOS apps using r2frida
robodroid - Manage (and soon deploy) Android machines with pre-defined behaviors for Cyber Range environments.
objection - 📱 objection - runtime mobile exploration