Hacker News
- Frida: Dynamic Instrumentation Toolkit https://frida.re/ 0 comments
- Inject JavaScript to explore native apps on Windows, Mac, Linux and iOS http://www.frida.re/ 50 comments
Lobsters
- Frida http://www.frida.re/ 2 comments reversing
- how to, Frida https://frida.re/ 2 comments reverseengineering
- Frida log https://frida.re 6 comments reverseengineering
- Hooking Go functions from Rust https://frida.re/ 5 comments rust
Linking pages
- Part 1 - Discovering that your Bluetooth car battery monitor is siphoning up your location data - doubleagent.net https://doubleagent.net/2023/05/21/a-car-battery-monitor-tracking-your-location 301 comments
- GitHub - ax/apk.sh: apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK. https://github.com/ax/apk.sh 111 comments
- Should We Chat, Too? Security Analysis of WeChat’s MMTLS Encryption Protocol - The Citizen Lab https://citizenlab.ca/2024/10/should-we-chat-too-security-analysis-of-wechats-mmtls-encryption-protocol/ 92 comments
- Fullscreen apps above the MacBook notch — Alin Panaitiu https://notes.alinpanaitiu.com/Fullscreen%20apps%20above%20the%20MacBook%20notch 79 comments
- Hooking Go from Rust - Hitchhiker’s Guide to the Go-laxy MetalBear 🐻 https://metalbear.co/blog/hooking-go-from-rust-hitchhikers-guide-to-the-go-laxy/ 57 comments
- Watching you watch: the tracking system of over-the-top TV streaming devices | the morning paper https://blog.acolyer.org/2020/02/10/watching-you-watch/ 57 comments
- “Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping - The Citizen Lab https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/ 53 comments
- DIY: kernel panic OS X and iOS in 10 LOC | by Ole André Vadla Ravnås | Medium https://medium.com/@oleavr/diy-kernel-panic-os-x-and-ios-in-10-loc-c250d9649159 49 comments
- Looking for more debugger https://scattered-thoughts.net/writing/looking-for-debugger-2/ 44 comments
- A Touch of Pwn - Part I https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/ 39 comments
- Running Python in the Linux Kernel | by Yonatan Goldschmidt | Medium https://medium.com/@yon.goldschmidt/running-python-in-the-linux-kernel-7cbcbd44503c 32 comments
- How to Hack & Protect Flutter Apps — Simple and Actionable Guide (Pt. 1/3) | by Talsec | Nov, 2022 | Medium | Medium https://medium.com/@talsec/how-to-hack-protect-flutter-apps-simple-and-actionable-guide-pt-1-3a873c7780db?sk=ea7943bf059d022531cbf2d9a93b7e6a&source=friends_link 32 comments
- Four Ways to Bypass Android SSL Verification and Certificate Pinning https://blog.netspi.com/four-ways-bypass-android-ssl-verification-certificate-pinning/ 29 comments
- Analyzing WhatsApp Calls with Wireshark, radare2 and Frida | by Marvin Schirrmacher | Medium https://medium.com/@schirrmacher/analyzing-whatsapp-calls-176a9e776213 27 comments
- Decrypting and analyzing HTTPS traffic without MITM - Silent Signal Techblog https://blog.silentsignal.eu/2020/05/04/decrypting-and-analyzing-https-traffic-without-mitm/ 23 comments
- Android Applications Reversing 101 https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/ 18 comments
- Four Ways to Bypass iOS SSL Verification and Certificate Pinning https://blog.netspi.com/four-ways-to-bypass-ios-ssl-verification-and-certificate-pinning/ 17 comments
- From Read to Domain Admin - Abusing Symantec Backup Exec with Frida - Silent Signal Techblog http://blog.silentsignal.eu/2014/02/27/from-read-to-domain-admin-abusing-symantec-backup-exec-with-frida/ 16 comments
- What I Learned Watching All 44 AppSec Cali 2019 Talks - tl;dr sec https://tldrsec.com/blog/appsec-cali-2019/ 15 comments
- EU Funding for Mobile App Traffic Interception | HTTP Toolkit https://httptoolkit.com/blog/frida-mobile-interception-funding/ 15 comments