awesome-frida
flexdecrypt
awesome-frida | flexdecrypt | |
---|---|---|
2 | 7 | |
2,918 | 629 | |
- | - | |
1.7 | 0.0 | |
4 months ago | 10 months ago | |
Swift | ||
Creative Commons Zero v1.0 Universal | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-frida
-
Apk.sh is a Bash script that makes reverse engineering Android apps easier
Wow, that sounds really cool! Searching around i found this list: https://github.com/dweinstein/awesome-frida
- iOS Reverse Engineering
flexdecrypt
-
Decrypt IPA
Use flex decrypt ipa. https://github.com/JohnCoates/flexdecrypt or tool bfdecrypt from sileo or cydia
-
[Question] If I jailbreak do I still have to deal with all the bs that comes along with sideloading (3 app limit, blacklisting, apps expire after seven days, revokes, etc) ?
decrypted are easily changeable apps and stripped of apple id connections, u can find some at https://armconverter.com/decryptedappstore/us or use this tool https://github.com/JohnCoates/flexdecrypt
- Can TrollStore ldid be used to sign ios binaries or just IPA?
- [question] how do I decrypt the binary of apps on my jailbroken phone so I can upload them to a computer then transfer to a non jailbroken phone?
-
Modern approach to dumping headers?
what you wanna do is decrypt Snapchat through flexdecrypt then dump the classes from that decrypted binary using classdump (or assdump lol) it should output a huge header file
-
[Question] How will the jailed version of Supercharge supply iPA files
Supercharge fetches the iPA through something like ipatool(https://github.com/majd/ipatool) and decrypts it through something like flexdecrypt(https://github.com/JohnCoates/flexdecrypt). In my opinion this is among the best solutions though it may require a lot of work get an implementation working. I tried to implement this on a piece of code I worked on, but flexdecrypt turned out to be too unreliable for the purpose - it would often simply fail to decrypt certain binaries.
-
iOS Reverse Engineering
2 - https://github.com/JohnCoates/flexdecrypt
What are some alternatives?
awesome-malware-analysis - Defund the Police.
ipatool - Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store
Free-RASP-Community - SDK providing app protection and threat monitoring for mobile devices, available for Flutter, Cordova, Android and iOS.
frida-ios-hook - A tool that helps you easy trace classes, functions, and modify the return values of methods on iOS platform
MobileApp-Pentest-Cheatsheet - The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
ktool - pip install k2l | Mach-O + Obj-C analysis TUI / CLI kit and library. Zero compiled deps, runs anywhere with a python interpreter.
objection - 📱 objection - runtime mobile exploration
frida - Clone this repo to build Frida
class-dump - Generate Objective-C headers from Mach-O files.
awesome-android-ui - A curated list of awesome Android UI/UX libraries
classdump-dyld - Class-dump any Mach-o file without extracting it from dyld_shared_cache