Frida入门

#

import frida,sys

# rdev = frida.get_usb_device()
# front_app = rdev.get_frontmost_application()  #当前最前端的进程
# print(front_app) # apps = rdev.enumerate_applications() #查看手机已安装的app # for app in apps: # print(app)

#交互模板

import frida, sys

//hook代码,采用javascript编写
jscode = """
//javascript代码,重点
"""
def on_message(message, data):
    if message['type'] == 'send':
        print("[*] {0}".format(message['payload']))
    else:
        print(message)

 
process = frida.get_usb_device().attach('应用完整包名')
script = process.create_script(jscode)
script.on('message', on_message)
script.load()
sys.stdin.read()

  

Frida入门操作:

https://www.jianshu.com/p/fa422d3b7148

https://www.cnblogs.com/aWxvdmVseXc0/p/12463319.html

设备:安卓手机

抓包:fiddler+xposed+JustTrustme

查壳:ApkScan-PKID

脱壳:frida-DEXDump

反编译:jadx-guihook:frida

pip install frida-dexdump

frida-rpc 主动调用
逆向神器 inspeckage https://repo.xposed.info/module/mobi.acpm.inspeckage

    firda-hook:https://blog.csdn.net/zhy025907/article/details/89512096

    肉丝:https://github.com/r0ysue/AndroidSecurityStudy

原文地址:https://www.cnblogs.com/HugJun/p/13540654.html