From f833bd2fd9f8775f1a008de4a97cc7c55016d251 Mon Sep 17 00:00:00 2001 From: kvsec <42719583+kvsec@users.noreply.github.com> Date: Tue, 17 Sep 2019 16:10:11 +0300 Subject: [PATCH] Update README.md --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index e85266c..c97ddce 100644 --- a/README.md +++ b/README.md @@ -74,6 +74,7 @@ Tip !! "adb backup" command can also be used for extracting application package * [Frida](http://www.frida.re/) - The toolkit works using a client-server model and lets you inject in to running processes not just on Android, but also on iOS, Windows and Mac. * [Diff-GUI](https://github.com/antojoseph/diff-gui) - A Web framework to start instrumenting with the avaliable modules, hooking on native, inject JavaScript using Frida. * [Fridump](https://github.com/Nightbringer21/fridump) - Fridump is using the Frida framework to dump accessible memory addresses from any platform supported. It can be used from a Windows, Linux or Mac OS X system to dump the memory of an iOS, Android or Windows application. +* [frida-ios-dump](https://github.com/AloneMonkey/frida-ios-dump) - Pull a decrypted IPA from a jailbroken device. * [House](https://github.com/nccgroup/house) - A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, is designed for helping assess mobile applications by implementing dynamic function hooking and intercepting and intended to make Frida script writing as simple as possible. * [AndBug](https://github.com/swdunlop/AndBug) - AndBug is a debugger targeting the Android platform's Dalvik virtual machine intended for reverse engineers and developers. * Identifying application process using adb shell