Skip to content

Instantly share code, notes, and snippets.

@h4k1m0u
Created January 12, 2025 22:13
Show Gist options
  • Save h4k1m0u/84426ce42fb6eb3f40f7e697065552e8 to your computer and use it in GitHub Desktop.
Save h4k1m0u/84426ce42fb6eb3f40f7e697065552e8 to your computer and use it in GitHub Desktop.
Notes taken from youtube videos about Frida

What is it

An instrumentation tool for x86, Android..., that targets binary applications.

Usage

  • To debug live processes.
  • To execute your script inside another process.

Applications

  • Frida is used for dynamic reverse engineering (i.e. analyze a program while software is running).
  • Static reverse engineering software in contrast take binaries to dissect them.

Skills

  • Attach to a process.
  • Hooking functions.
  • Modifying function arguments.
  • Calling functions.
  • Inspecting memory.
  • Modifying memory.

Goals

Live inspection of other processes (No source code and no debuggin symbols).

Engineering behind

On Linux, Frida uses sys calls such as ptrace so that one process can observe and control another one (& examine/change in its memory and registers).

Instrumentation code

  • Injected into binary application & exectuted at runtime.
  • Frida executes user-defined js programs inside another process.
  • Frida has also bindings for Python, C, node.js...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment