From 6c5abf2344dfd07abca4979099bdc6e022aef40e Mon Sep 17 00:00:00 2001 From: Tijme Gommers Date: Mon, 6 Apr 2020 12:59:01 +0200 Subject: [PATCH] Add `Fridax` to the Reverse Engineering Tools. https://github.com/NorthwaveNL/fridax --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 9ec2686..d2ea9bf 100644 --- a/README.md +++ b/README.md @@ -695,6 +695,7 @@ See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing). * [pwndbg](https://github.com/pwndbg/pwndbg) - GDB plug-in that eases debugging with GDB, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers, and exploit developers. * [rVMI](https://github.com/fireeye/rVMI) - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool. * [x64dbg](http://x64dbg.com/) - Open source x64/x32 debugger for windows. +* [Fridax](https://github.com/NorthwaveNL/fridax) - Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications. ## Security Education Courses