You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Pull request to add friTap. friTap is a tool for simplifying SSL/TLS traffic analysis for researchers and pentesters on Android by making SSL decryption effortless. It allows TLS key extraction and the decryption of TLS payload as PCAP in real-time.
Copy file name to clipboardExpand all lines: README.md
+1
Original file line number
Diff line number
Diff line change
@@ -118,6 +118,7 @@ A collection of Android security-related resources.
118
118
1.[PAPIMonitor](https://github.com/Dado1513/PAPIMonitor) – PAPIMonitor (Python API Monitor for Android apps) is a Python tool based on Frida for monitoring user-select APIs during the app execution.
119
119
1.[Android_application_analyzer](https://github.com/NotSoSecure/android_application_analyzer) - The tool is used to analyze the content of the Android application in local storage.
120
120
1.[Decompiler.com](https://www.decompiler.com/) - Online APK and Java decompiler
121
+
1.[friTap](https://github.com/fkie-cad/friTap)- - Intercept SSL/TLS connections with Frida; Allows TLS key extraction and decryption of TLS payload as PCAP on Android in real-time.
121
122
1.~~[Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals~~
122
123
1.~~[Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (Linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.php)~~
123
124
1.~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~
0 commit comments