Frida Android Hooks Save

Lets you hook Method Calls in Frida ( Android )

Project README


Lets you hook LoadURL Method Calls in Frida ( Android )

Welcome to Firda- Hooks ( Android )

You will find different different modules to hook various api calls in the android platform to conduct security analysis. Right now , we have the following modules :

WebView loadUrl() : android.webkit.WebView calls to webview is logged .

getDeviceId() : android.telephony.TelephonyManager detects if the above api is called and can return a fake device id if needed.

isDebuggerConnected() : android.os.Debug checks if a debugger is connected (JDB) to the app instance , can log and re-implement the method to fake it to the application which is being instrumented.

.exists() : checks for the presence of files in disk , can log and even hide the presence of files from applications using this api.

Root Bypass Re- Implementation : example on how a method could be re-implemented overriding the root-checks of an android application .

Setup :

1 . Load Firda -server into your android device .

  $ curl -O

  $ adb push frida-server /data/local/tmp/

  $ adb shell "chmod 755 /data/local/tmp/frida-server"

  $ adb shell "/data/local/tmp/frida-server &" 

2 . Install frida on your machine , easy_install frida

3 . Change the package_name variable in the script to match the application you are instrumenting .

4 . Run python

5 . Run any app which uses the instumented method / api.

Have fun !

Authors and Contributors


Support or Contact

Having trouble with Scripts ? Check out our documentation or contact support or Log an Issue and we’ll help you sort it out.

Open Source Agenda is not affiliated with "Frida Android Hooks" Project. README Source: antojoseph/frida-android-hooks
Open Issues
Last Commit
4 years ago

Open Source Agenda Badge

Open Source Agenda Rating