Reverse Dependencies of frida
The following projects have a declared dependency on frida:
- androguard — Androguard is a full python tool to play with Android files.
- androguard-p — Androguard is a full python tool to play with Android files.tytr
- AndroidFridaManager — A python API in order to install and run the frida-server on an Android device.
- AresHook — A simple hook library.
- dwarf-debugger — Full featured multi arch/os debugger built on top of PyQt5 and frida
- frida-play — 没有描述哈
- frida-uiopen — Invoke the openURL of iOS based on frida.
- friTap — Decrypts and logs a process's SSL/TLS traffic on all major platforms.
- fritm — Minimalist and cross-platform network reverse engineering framework
- ipadumper — Automatically install apps on a jailbroken device iOS device and generate decrypted IPAs
- jnitrace — A tool for tracing use of the JNI in Android apps
- linktools — linktools toolkit
- lrabbit-scrapy — this is a small spider,you can easy running. When you often need to crawl a single site, you can reduce some repeated code every time, using this small framework you can quickly crawl data into a file or database.
- malscan — A Python package for automated static and dynamic analysis of malware samples. Supports both static and dynamic analysis techniques with feature extraction and export capabilities for static features.
- rlsdk_python — no summary
- robodroid — Manage and deploy Android machines with pre-defined behaviors for Cyber Range environments
- simplepy — Python General Toolkit Collection
- uniref — Unity reflection framework
- wallbreaker — 🔨 Break Java Reverse Engineering form Memory World!
- winstrument — no summary
1