From f66eb98cfc079b6483f26e913c8de9b6324e80a0 Mon Sep 17 00:00:00 2001 From: Daniel Baier Date: Mon, 9 Dec 2024 10:51:00 +0100 Subject: [PATCH] Adding FRITAP (#213) Pull request to add friTap. friTap is a tool for simplifying SSL/TLS traffic analysis for researchers and pentesters on Android by making SSL decryption effortless. It allows TLS key extraction and the decryption of TLS payload as PCAP in real-time. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 8283536..a92970b 100644 --- a/README.md +++ b/README.md @@ -118,6 +118,7 @@ A collection of Android security-related resources. 1. [PAPIMonitor](https://github.com/Dado1513/PAPIMonitor) – PAPIMonitor (Python API Monitor for Android apps) is a Python tool based on Frida for monitoring user-select APIs during the app execution. 1. [Android_application_analyzer](https://github.com/NotSoSecure/android_application_analyzer) - The tool is used to analyze the content of the Android application in local storage. 1. [Decompiler.com](https://www.decompiler.com/) - Online APK and Java decompiler +1. [friTap](https://github.com/fkie-cad/friTap)- - Intercept SSL/TLS connections with Frida; Allows TLS key extraction and decryption of TLS payload as PCAP on Android in real-time. 1. ~~[Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals~~ 1. ~~[Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (Linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.php)~~ 1. ~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~