QuAPI
frida
QuAPI | frida | |
---|---|---|
1 | 14 | |
4 | 14,888 | |
- | 2.4% | |
10.0 | 9.2 | |
over 1 year ago | 3 days ago | |
C++ | Meson | |
MIT License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
QuAPI
frida
-
Reversing an Android app API
Frida, uff this is just AMAZING, yes with uppercase and in bold letters. They also has bindings on different languages that can be found in their github repository. Spoiler alert...the Go binding it's pure shit...really couldn't run it. Use just the default that it's installed with pip install frida-tools.
-
Using LD_PRELOAD to cheat, inject features and investigate programs
A great framework for doing something along those lines is Frida (https://github.com/frida/frida). Works on a bunch of stuff, including Android and iOS. Some global-ish certificate pinning bypasses work through Frida, by patching http libraries to not raise exceptions, accept system certificates, etc and just quietly hum along instead. Certificate unpinning in turn enables network MITM with mitmproxy, which makes it a lot quicker and easier to inspect, block, or modify network traffic.
Funnily enough, I've seen much stronger obfuscation from reverse engineering from my cheap Tuya IoT devices app than from my bank app.
-
iOS Application Security And Static Analysis
Install Frida from Github :- https://github.com/frida/frida
-
Have you ever heard of apk.sh? It makes reverse engineering Android apps easier.
// see: https://github.com/frida/frida/issues/382
-
Firefox Android now supports tampermonkey
If anyone needs a "monkey" not for web pages but for any process on your computer system, may I recommend Frida:
https://frida.re
https://github.com/frida/frida
With Frida, you write JavaScript programs and inject them into arbitrary processes, to hook and modify and call whatever you please.
It gets a lot of use in the reverse engineering and vulnerability research communities, but has broader scope too. For instance, I used it recently to automate the UI of a video production program on Windows, by injecting a thread that sends window messages to the main message loop and hooks into various system dialog functions.
- [Request] Tweak to Decrypt iPAs on Palera1n!
-
apk.sh, make reverse engineering Android apps easier!
var android_log_write = new NativeFunction( Module.getExportByName(null, '__android_log_write'), 'int', ['int', 'pointer', 'pointer'] ); var tag = Memory.allocUtf8String("[frida-sript][ax]"); var work = function() { setTimeout(function() { android_log_write(3, tag, Memory.allocUtf8String("ping @ " + Date.now())); work(); }, 1000); } work(); // console.log does not seems to work. see: https://github.com/frida/frida/issues/382 console.log("console.log"); console.error("console.error"); console.warn("WARN"); android_log_write(3, tag, Memory.allocUtf8String(">--(O.o)-<)");
-
How to use Galaxy Watch 4 on "unsupported" Android devices
Go to https://github.com/frida/frida/releases and download the latest frida-server--android-arm64.xz. Extract it and run adb push frida-server--android-arm64 /sdcard/frida-server
- HTTP Toolkit
-
Frida 15 Is Out
It sounds like a kind of black magic:
> ...It’s a dynamic code instrumentation toolkit. It lets you inject snippets of JavaScript or your own library into native apps on Windows, macOS, GNU/Linux, iOS, Android, and QNX.
> ...Frida’s core is written in C and injects QuickJS into the target processes, where your JS gets executed with full access to memory, hooking functions and even calling native functions inside the process.
> There’s a bi-directional communication channel that is used to talk between your app and the JS running inside the target process.
Here's a description of the architecture:
https://frida.re/docs/hacking/
And the source:
https://github.com/frida/frida
---
Apparently using "wxWindows Library Licence, Version 3.1":
> This is essentially the LGPL, with an exception stating that derived works in binary form may be distributed on the user's own terms. This is a solution that satisfies those who wish to produce GPL'ed software using Frida, and also those producing proprietary software.
https://github.com/frida/frida/blob/master/COPYING
What are some alternatives?
route-resource-preload - 🚀 Focus on improving the first screen loading speed of applications and providing the best user experience, inspiration comes from the preloading of NextJS. (https://web.dev/route-prefetching-in-nextjs/)
objection - 📱 objection - runtime mobile exploration
Dynex-Neuromorphic-Chip - Digital Memcomputing Machine (DMM) based SAT-Solver
httptoolkit - HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac :tada: Open an issue here to give feedback or ask for help.
ClickHouse - ClickHouse® is a free analytics DBMS for big data
mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
ld_preload-sounds - Generates raw WAV output by hooking malloc() and read().
Proxyman - Modern. Native. Delightful Web Debugging Proxy for macOS, iOS, and Android ⚡️
frida-ios-hook - A tool that helps you easy trace classes, functions, and modify the return values of methods on iOS platform
httptoolkit-server - The backend of HTTP Toolkit
puppeteer-extra - 💯 Teach puppeteer new tricks through plugins.
flexdecrypt - Decrypt iOS Apps and Mach-O binaries