Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/antojoseph/frida-android-hooks
Lets you hook Method Calls in Frida ( Android )
https://github.com/antojoseph/frida-android-hooks
Last synced: 3 months ago
JSON representation
Lets you hook Method Calls in Frida ( Android )
- Host: GitHub
- URL: https://github.com/antojoseph/frida-android-hooks
- Owner: antojoseph
- Created: 2016-02-23T11:26:24.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2019-07-30T14:04:52.000Z (over 5 years ago)
- Last Synced: 2024-04-17T03:06:43.080Z (7 months ago)
- Language: Python
- Homepage:
- Size: 106 KB
- Stars: 381
- Watchers: 24
- Forks: 99
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-frida - frida-android-hooks - Hook method calls in Android (Libraries)
README
# frida-android-hooks
Lets you hook LoadURL Method Calls in Frida ( Android )
Welcome to Firda- Hooks ( Android )
You will find different different modules to hook various api calls in the android platform to conduct security analysis. Right now , we have the following modules :
WebView loadUrl() : android.webkit.WebView calls to webview is logged .
getDeviceId() : android.telephony.TelephonyManager detects if the above api is called and can return a fake device id if needed.
isDebuggerConnected() : android.os.Debug checks if a debugger is connected (JDB) to the app instance , can log and re-implement the method to fake it to the application which is being instrumented.
.exists() : java.io.File checks for the presence of files in disk , can log and even hide the presence of files from applications using this api.
Root Bypass Re- Implementation : root.py example on how a method could be re-implemented overriding the root-checks of an android application .
Setup :
1 . Load Firda -server into your android device .
$ curl -O https://build.frida.re/frida/android/arm/bin/frida-server
$ adb push frida-server /data/local/tmp/
$ adb shell "chmod 755 /data/local/tmp/frida-server"
$ adb shell "/data/local/tmp/frida-server &"
2 . Install frida on your machine , easy_install frida
3 . Change the package_name variable in the script to match the application you are instrumenting .
4 . Run python hook_webview_frida_example.py
5 . Run any app which uses the instumented method / api.
Have fun !
Authors and Contributors
@antojoseph
Support or Contact
Having trouble with Scripts ? Check out our documentation or contact support or Log an Issue and we’ll help you sort it out.