iOS/android frida library for reversing
-
backtrace : Print java call stack
function backtrace()
-
java_single_hook : hook java class method and auto log args and return value
function java_single_hook(className, methd, callbackFunc)
-
java_hook : hook java class all overload methods and auto log args and return value
function java_hook(className, func, callbackFunc)
-
native_hook_symbol : hook native function by symbol
function native_hook_symbol(moduleName, funcName, onEnterFunc, onLeaveFunc)
-
native_hook_address : hook native function by address
function native_hook_address(moduleName, funcAddr, onEnterFunc, onLeaveFunc)
-
print_class_fields : print class object all fields
function print_class_fields(obj)
-
bytes_to_string : byte data convert to java string
function bytes_to_string(data)
-
string_to_bytes : string convert to byte data
function string_to_bytes(str)
-
hook_register_natives : hook RegisterNatives in libart.so
function hook_register_natives()
some test script about app and service hook in android
-
get_image_vm_slide : get image vm address slide
function get_image_vm_slide(modulePath)
-
get_all_objc_class : get all ObjC class by image path
function get_all_objc_class(modulePath)
-
get_all_class_methods : get all methods of a class
function get_all_class_methods(classname)
-
get_info_form_address : get some info from addr
function get_info_form_address(address)
-
find_symbol_from_address : find best match objc symbol from address
function find_symbol_from_address(modulePath,addr)
-
backtrace
-
function backtrace(onlyMainModule)
-
xbacktrace : print a symbol call stack
function xbacktrace(context)
this is some test js script loaded into frida python script
you can add your test js script similar to provided easily
you can refer to the sample
this project is twitted by @Mobile Security at https://twitter.com/mobilesecurity_/status/1172116516839546883
emmmm, But it just a baby projet. Be glade that you make it grouth with me