diff --git a/README.md b/README.md index e85266c..c97ddce 100644 --- a/README.md +++ b/README.md @@ -74,6 +74,7 @@ Tip !! "adb backup" command can also be used for extracting application package * [Frida](http://www.frida.re/) - The toolkit works using a client-server model and lets you inject in to running processes not just on Android, but also on iOS, Windows and Mac. * [Diff-GUI](https://github.com/antojoseph/diff-gui) - A Web framework to start instrumenting with the avaliable modules, hooking on native, inject JavaScript using Frida. * [Fridump](https://github.com/Nightbringer21/fridump) - Fridump is using the Frida framework to dump accessible memory addresses from any platform supported. It can be used from a Windows, Linux or Mac OS X system to dump the memory of an iOS, Android or Windows application. +* [frida-ios-dump](https://github.com/AloneMonkey/frida-ios-dump) - Pull a decrypted IPA from a jailbroken device. * [House](https://github.com/nccgroup/house) - A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, is designed for helping assess mobile applications by implementing dynamic function hooking and intercepting and intended to make Frida script writing as simple as possible. * [AndBug](https://github.com/swdunlop/AndBug) - AndBug is a debugger targeting the Android platform's Dalvik virtual machine intended for reverse engineers and developers. * Identifying application process using adb shell