From 20f5142aa25d029a20b8502830e881d9f0c8d05c Mon Sep 17 00:00:00 2001 From: Daniel Baier Date: Wed, 20 Nov 2024 17:29:37 +0100 Subject: [PATCH] update webseite --- docs/_config.yml | 2 +- docs/index.md | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/_config.yml b/docs/_config.yml index 5a3b49a..a794115 100644 --- a/docs/_config.yml +++ b/docs/_config.yml @@ -1,4 +1,4 @@ -title: "friTap" +title: "friTap - DECRYPTING TLS TRAFFIC ON THE FLY" description: "Powerful SSL/TLS traffic decryption tool" theme: jekyll-theme-slate plugins: diff --git a/docs/index.md b/docs/index.md index d37fb0f..7d2a3c8 100644 --- a/docs/index.md +++ b/docs/index.md @@ -25,8 +25,8 @@ The main features of friTap are: - TLS key extraction in real time - Decryption of TLS payload as PCAP in real time -- Integration with Python. More -- Support for custom Frida scripts +- Integration with Python. [Learn more](https://github.com/fkie-cad/friTap/blob/main/INTEGRATION.md) +- Support for custom Frida scripts. [Details](https://github.com/fkie-cad/friTap/blob/main/USAGE.md#Using-friTap-with-a-custom-Frida-scripts) - Support of most common SSL libraries (OpenSSL, BoringSSL, NSS, GnuTLS, etc.) @@ -67,7 +67,7 @@ The `-m` parameter indicates that we are analyzing a mobile application in the a ```bash $ fritap –m –k TLS_keys.log -[*] BoringSSL.so found & will be hooked on iOS! +[*] BoringSSL.dylib found & will be hooked on iOS! [*] iOS dynamic loader hooked. [*] Logging keylog file to TLS_keys.log ```