-
Reversense
- France
- https://infosec.exchange/@frenchyeti
- @FrenchYeti
Highlights
- Pro
Starred repositories
Repo for counting stars and contributing. Press F to pay respect to glorious developers.
A reference implementation of GraphQL for JavaScript
Control and manage Android devices from your browser.
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…
(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
proguard resource for Android by wechat team
A curated list of GPT agents for cybersecurity
🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens
android sdk 源码解析——旨在帮助Android开发者更好的学习Android!我们只是一群普通的程序员,但是,我们热爱分享,想热热闹闹的玩点有意义的事!如果你也想陪我们一起愉快的玩耍,欢迎加入我们!Issues认领分析文章!
A True Instrumentable Binary Emulation Framework
LICEcap simple animated screen capture tool for Windows and OS X
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
pull decrypted ipa from jailbreak device
weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interesting functionality in large codebases.
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Mobile Edge-Dynamic Unified Security Analysis
Read-only mirror of Trusted Firmware-A
Bridge API to connect with existing Java APIs.
QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things.
Firefox Profiler — Web app for Firefox performance analysis
Project page for "The Fuzzing Book"
[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods…
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices