Uses flask for a web framework, jinja for templates, redis for message queue, server-side push for real-time updates, and some JS. Start the web server with the following command: python diff-gui.py -p [port] -a [listening address]. If it complains, make sure you have all the Python dependencies installed! Install redis and start it by typing redis-server in the console. Download frida server for ARM Android from frida.re and push it to the device. Execute frida-ps -U to ensure a working installation. Now, you can start instrumenting with the available modules! Happy Hacking :) Initial Screen - Enter Package name here! Select the Module you want to use, or add modules by just adding JS scripts to the modules folder. Run the script or make any changes in the IDE and get Results on the same screen! You can also do native hooking.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
DECAF++ is a fast whole-system dynamic taint analysis framework with improved performance and elasticity.
A tool for identifying and extracting parameters from HTTP requests and responses
Dynamic application security testing tool for identifying and fixing web application vulnerabilities.
Embeddable Yara library for Java with support for loading rules and scanning data.
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
WackoPicko is a vulnerable website with known vulnerabilities, now available as a Docker image and included in the OWASP Broken Web Applications Project.