Discussions not found
Sorry, we couldn't find anything for https://github.com/owasp/owasp-mstg/blob/master/document/0x05c-reverse-engineering-and-tampering.md.
See some search examples.
Linked pages
- React Native · Learn once, write anywhere http://facebook.github.io/react-native/ 102 comments
- ld.so(8) - Linux manual page https://man7.org/linux/man-pages/man8/ld.so.8.html 7 comments
- Java Decompiler http://java-decompiler.github.io 4 comments
- CFR - yet another java decompiler. http://www.benf.org/other/cfr/ 3 comments
- GitHub - linkedin/qark: Tool to look for several security related Android application vulnerabilities https://github.com/linkedin/qark 3 comments
- GitHub - m0bilesecurity/RMS-Runtime-Mobile-Security: Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security 1 comment
- GitHub - sensepost/objection: 📱 objection - runtime mobile exploration https://github.com/sensepost/objection 0 comments
- GitHub - chame1eon/jnitrace: A Frida based tool that traces usage of the JNI API in Android apps. https://github.com/chame1eon/jnitrace 0 comments
- Frida 12.10 Released | Frida ⢠A world-class dynamic instrumentation toolkit https://frida.re/news/2020/06/29/frida-12-10-released/ 0 comments
- GitHub - MobSF/Mobile-Security-Framework-MobSF: Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. https://github.com/MobSF/Mobile-Security-Framework-MobSF 0 comments
- Modes of Operation | Frida ⢠A world-class dynamic instrumentation toolkit http://www.frida.re/docs/modes/#preloaded 0 comments
Related searches:
Search whole site: site:github.com
Search title: owasp-mastg/0x05c-Reverse-Engineering-and-Tampering.md at master · OWASP/owasp-mastg · GitHub
See how to search.