📲
Android Reversing with Frida for Examiners
Authors:M. WilliamsonC. Atha
  • Android Reversing for Examiners
  • Setting Up
    • Prerequisites
    • Our Target: Private Photo Vault
  • Lab
    • [1] Lab setup and initial app exploration
      • [1.1] Upload frida-server to the emulator or device and run using nohup
      • [1.2] Review files in the app data directory
    • [2] Perform static analysis to locate some functions of interest
    • [3] Deploy method hooks using frida REPL
    • [4a] Moar Static Analysis
    • [4b] Cast a wide net with DBI
    • [4c] PIN bruteforce
      • [4c.1] PIN bruteforce (in depth)
  • Bonus Labs
  • Ready for more?
  • Frida-tools Reference
    • Installation & Common Flags
    • frida
    • frida-ps
    • frida-trace
  • Other Processes Reference
    • Extracting an APK specimen from the device
    • Troubleshooting frida connectivity
  • What's Next
    • Recommended Toolkits and Scripts
    • Additional Resources / Questions
  • Contact Us
Powered by GitBook
On this page

Was this helpful?

  1. Frida-tools Reference

Installation & Common Flags

PreviousReady for more?Nextfrida

Last updated 5 years ago

Was this helpful?

The frida-tools suite comes from this repo:

Assuming you have Python 3+ installed, you can install frida-tools with the following command:

pip install frida-tools

Once installed, you now have ready access to the frida tools suite.

These include:

Tool Name

Description

More Info

frida-ps

List running processes

frida-trace

Seek out and trace functions en masse based on keyword searching.

frida

Frida REPL (Read-Eval-Print-Loop)

frida-ps
frida-trace
frida
GitHub - frida/frida-tools: Frida CLI toolsGitHub
Logo