Add Fridax to the Reverse Engineering Tools.

https://github.com/NorthwaveNL/fridax
This commit is contained in:
Tijme Gommers 2020-04-06 12:59:01 +02:00 committed by GitHub
parent 64e7782611
commit 6c5abf2344
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -695,6 +695,7 @@ See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing).
* [pwndbg](https://github.com/pwndbg/pwndbg) - GDB plug-in that eases debugging with GDB, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers, and exploit developers.
* [rVMI](https://github.com/fireeye/rVMI) - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.
* [x64dbg](http://x64dbg.com/) - Open source x64/x32 debugger for windows.
* [Fridax](https://github.com/NorthwaveNL/fridax) - Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.
## Security Education Courses