Skip to content

Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for security testing and debugging.

Notifications You must be signed in to change notification settings

decryptable/frida-android-jni-hooking

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Android Native Hooking Project

This project demonstrates how to perform native hooking on Android applications using Frida. It includes scripts for intercepting and logging JNI function calls within native libraries.

Project Structure

  • info.js: A Frida script to log all loaded native libraries and their JNI functions.
  • hook.js: A Frida script to hook specific JNI functions in a specified native library.
  • list_all_loaded.js: A Frida script to list all loaded native libraries and their functions.

Getting Started

Prerequisites

  • Frida must be installed on your system.
  • You need root access on your Android device or emulator.
  • Ensure you have adb installed and properly configured.

Installation

  1. Clone the repository:

    git clone https://github.com/decryptable/android-native-hooking.git
    cd android-native-hooking
  2. Connect your Android device or start your emulator.

  3. Start the Frida server on your Android device:

    adb shell "/data/local/tmp/frida-server &"

Usage

Info Script

The info.js script logs all loaded native libraries and their JNI functions:

frida -U -f com.example.targetapp -l info.js --no-pause

ScreenShots

Screenshot from 2024-08-03 00-33-39

About

Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for security testing and debugging.

Resources

Stars

Watchers

Forks

Languages

  • JavaScript 100.0%