BetterDump (v1.0) is an open source memory dumping tool based on Fridump and frida-dump.
Fridump (v0.1) is an open source memory dumping tool, primarily aimed to penetration testers and developers. Fridump is using the Frida framework to dump accessible memory addresses from any platform supported. It can be used from a Windows, Linux or Mac OS X system to dump the memory of an iOS, Android or Windows application.
How to:
fridump [-h] [-o dir] [-U] [-v] [-r] [-s] [--max-size bytes] process
The following are the main flags that can be used with fridump:
positional arguments:
process the process that you will be injecting to
optional arguments:
-h, --help show this help message and exit
-o dir, --out dir provide full output directory path. (def: 'dump')
-U, --usb device connected over usb
-v, --verbose verbose
-r, --read-only dump read-only parts of memory. More data, more errors
-m, --modules extract a list of modules and their base addresses from the app
-s, --strings run strings on all dump files. Saved in output dir
--max-size bytes maximum size of dump file in bytes (def: 20971520)
To find the name of a local process, you can use:
frida-ps
For a process that is running on a USB connected device, you can use:
frida-ps -U
Examples:
fridump -U Safari - Dump the memory of an iOS device associated with the Safari app
fridump -U -s com.example.WebApp - Dump the memory of an Android device and run strings on all dump files
fridump -r -o [full_path] - Dump the memory of a local application and save it to the specified directory
More examples can be found here
To install Fridump you just need to clone it from git and run it:
git clone ??
python fridump.py -h
To use fridump you need to have frida installed on your python environment and frida-server on the device you are trying to dump the memory from. The easiest way to install frida on your python is using pip:
pip install frida
More information on how to install Frida can be found here
For iOS, installation instructions can be found here.
For Android, installation instructions can be found here.
Note: On Android devices, make sure that the frida-server binary is running as root!