From 40a6b7ed9bf6d77223f5a5553ab93d1cc8649c79 Mon Sep 17 00:00:00 2001 From: Baris Erdem Date: Tue, 7 Apr 2026 12:23:06 +0200 Subject: [PATCH] Add rekit to Networking tools rekit is a reverse engineering toolkit for mobile APIs that captures Android HTTP traffic via Frida hooks (OkHttp, Dio, URLConnection, WebView) without proxy setup. Also includes APK endpoint scanning, TLS fingerprint testing, bot protection detection, and API client generation from captured traffic. https://github.com/b-erdem/rekit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index f9a8ed4..6a4497d 100644 --- a/README.md +++ b/README.md @@ -97,6 +97,7 @@ Awesome-Android-Reverse-Engineering is an amazing list for people who work in ta - [SSLsplit](https://github.com/droe/sslsplit) - Intercepts and manipulates SSL/TLS encrypted traffic. - [MITMProxy](https://mitmproxy.org/) - Man-in-the-middle proxy for analyzing network traffic. - [apk-mitm](https://github.com/shroudedcode/apk-mitm) - Prepares APKs for HTTPS inspection. + - [rekit](https://github.com/b-erdem/rekit) - Reverse engineering toolkit for mobile APIs. Captures HTTP traffic via Frida hooks (OkHttp, Dio, URLConnection, WebView) without proxy setup, scans decompiled APKs for endpoints, tests TLS fingerprints, and detects bot protection. - **Dynamic Instrumentation:** - [☆ Frida](https://frida.re/) - Dynamic instrumentation toolkit for runtime manipulation. - **Xposed Framework** - For hooking and modifying app behavior at runtime.