Skip to content

climber-li/DetectFrida

 
 

Repository files navigation

DetectFrida

This project has 3 ways to detect frida hooking a. Detect through named pipes used by Frida b. Detect through frida specific named thread c. Compare text section in memory with text section in disk

More details can be found @ https://darvincitech.wordpress.com/2019/12/23/detect-frida-for-android/

Also this project has 3 mechanisms to harden the native code a. Replace certain libc calls with syscalls b. Replace string,memory related operation with custom implementation c. Apply O-LLVM native obfuscation

More details can be found @ https://darvincitech.wordpress.com/2020/01/07/security-hardening-of-android-native-code/

Only arm64, armv7a architectures are supported in this project. The hardened APK is provided for interested reverse engineers to analyze.

Updates: a. Re-aligned functions b. Fix scanning of executable sections only if it is readable to avoid crashes when app is targetting API 29 c. Stripped comment section in native library to prevent APKId detecting O-LLVM obfuscator is used

About

Detect Frida for Android

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 66.9%
  • C++ 16.8%
  • CMake 9.3%
  • Java 7.0%