Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.
-
Updated
May 20, 2025 - Shell
Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.
🔐 Run frida-server on boot with Magisk, always up-to-date
强大的 Frida 重打包工具,用于 iOS 和 Android。轻松修改 Frida 特征,增强隐蔽性,绕过检测。简化逆向工程和安全测试。Powerful Frida repackaging tool for iOS and Android. Easily modify Frida servers to enhance stealth and bypass detection. Streamlines reverse engineering and security testing.
Script to Automate installtion of Apps ,frida server and moving Burpsuite certificate to root folder
Run a more undetectable frida server on boot using magisk 🔐✅
Tool to automate the process of embedding dynamic libraries into iOS applications from GNU/Linux
Script to inject frida gadget into APK
Exposure Notifications framework instrumentation for Android
Run strongr-frida-server on boot with Magisk
Intercept Business Suite traffic on Android by bypassing SSL pinning through replacement of modified native libraries, using tools like ProxyPin or Reqable.
Script to automatically install latest frida and download server binaries needed
This is an automate shell script that has a menu of dev tools for starting frida server, installing-unistall android apk or mass unistall android packages, and starting burp suite
Intercept Facebook network traffic on Android device
Documenting all the sources from where I'm learning Mobile(adnroid/IOS) bug bounty so if another researcher want to start with mobile bug bounty he/she don't struggle for resources
Add a description, image, and links to the frida topic page so that developers can more easily learn about it.
To associate your repository with the frida topic, visit your repo's landing page and select "manage topics."