Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/xbyl1234/android_analysis
a few android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog
https://github.com/xbyl1234/android_analysis
android-app-analyse c2java frida java2c jni jni-trace jnilog jnitrace sslkeylog trace
Last synced: 21 days ago
JSON representation
a few android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog
- Host: GitHub
- URL: https://github.com/xbyl1234/android_analysis
- Owner: xbyl1234
- Created: 2021-08-11T11:22:18.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2024-05-08T02:33:42.000Z (7 months ago)
- Last Synced: 2024-08-05T17:27:12.928Z (4 months ago)
- Topics: android-app-analyse, c2java, frida, java2c, jni, jni-trace, jnilog, jnitrace, sslkeylog, trace
- Language: C
- Homepage:
- Size: 7.91 MB
- Stars: 103
- Watchers: 11
- Forks: 54
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - xbyl1234/android_analysis - a few android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog (C)
README
chinglish document
## how to build
```
android studio build , must debug, some bug in release that dobby dont work
tools lib will in app/libs/arm64-v8a
libnative_hook.so : trace jni
libssl2.so : hook ssl key log
sniffer.so : use tcpdum to capture specified app packet, must put it and tcpdump on /data
```
## how to use and function```
1. frida printf help class
project/frida/frida_helper.js can help you convert object to string,using inject fastjson and gjson by xposed.
``````
2. capture a app packet
put sniffer.so and tcpdump on /data
use cmd: ./sniffer.so com.xxxx pacp_name , and ctrl-c stop capture , save to /sdcard/com.xxxx_pacp_name.pcap
``````
3. hook ssl key log
inject libssl2.so by yourself, packet.txt will write in /sdcard/Android/com.xxxxx/packet.txt, need some sdcard permission
``````
4. trace all java2c, c2java jni call log
put libnative_hook.so in /data/app , and chmod 777, use project/frida/analyse.js to inject it in your target app
and do this before:
write your target packet name on packet_name
write your target trace lib name on target_name
use use_file_log() can write log in file ,if not will wirte in android log
must enable frida printf help class, or undefine USE_IN_JAVA_PARSE
other:
arm32 is bug, fix bug by yourself
```wecome to give me money, qq is 734248537, see you leite