All Projects → iGio90 → Dwarf

iGio90 / Dwarf

Licence: gpl-3.0
Full featured multi arch/os debugger built on top of PyQt5 and frida

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Dwarf

Corellium Android Unpacking
Android Unpacking Automation using Corellium Devices
Stars: ✭ 107 (-88.32%)
Mutual labels:  frida, reverse-engineering
Awesome Reverse Engineering
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Stars: ✭ 2,954 (+222.49%)
Mutual labels:  frida, reverse-engineering
Frida Android Scripts
Some frida scripts
Stars: ✭ 124 (-86.46%)
Mutual labels:  frida, reverse-engineering
Rms Runtime Mobile Security
Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
Stars: ✭ 1,194 (+30.35%)
Mutual labels:  frida, reverse-engineering
Jnitrace
A Frida based tool that traces usage of the JNI API in Android apps.
Stars: ✭ 534 (-41.7%)
Mutual labels:  frida, reverse-engineering
Iostrace
alternative strace for iOS device(64bit) on frida
Stars: ✭ 84 (-90.83%)
Mutual labels:  frida, reverse-engineering
Luject
🍹A static injector of dynamic library for application (android, iphoneos, macOS, windows, linux)
Stars: ✭ 203 (-77.84%)
Mutual labels:  frida, reverse-engineering
Antidebugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-82.42%)
Mutual labels:  cracking, reverse-engineering
Dexcalibur
[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Stars: ✭ 512 (-44.1%)
Mutual labels:  frida, reverse-engineering
Reverse Engineering Tutorials
Reverse Engineering Tutorials
Stars: ✭ 438 (-52.18%)
Mutual labels:  cracking, reverse-engineering
Appmon
Documentation:
Stars: ✭ 1,157 (+26.31%)
Mutual labels:  frida, reverse-engineering
Qbdi
A Dynamic Binary Instrumentation framework based on LLVM.
Stars: ✭ 801 (-12.55%)
Mutual labels:  frida, reverse-engineering
Frida Snippets
Hand-crafted Frida examples
Stars: ✭ 1,081 (+18.01%)
Mutual labels:  frida, reverse-engineering
Jnitrace Engine
Engine used by jnitrace to intercept JNI API calls.
Stars: ✭ 94 (-89.74%)
Mutual labels:  frida, reverse-engineering
Twitterx
Keeping Twitter for macOS alive with code injection
Stars: ✭ 187 (-79.59%)
Mutual labels:  cracking, reverse-engineering
Magisk Frida
🔐 Run frida-server on boot with Magisk, always up-to-date
Stars: ✭ 144 (-84.28%)
Mutual labels:  frida, reverse-engineering
Ollydbg Scripts
Unpacking scripts for Ollydbg.
Stars: ✭ 109 (-88.1%)
Mutual labels:  cracking, reverse-engineering
Pelock Software Protection And Licensing Sdk
Software copy protection against cracking & reverse engineering with anti-cracking & anti-debugging techniques. Software license key system with time trial options.
Stars: ✭ 109 (-88.1%)
Mutual labels:  cracking, reverse-engineering
Frick
frick - aka the first debugger built on top of frida
Stars: ✭ 267 (-70.85%)
Mutual labels:  frida, reverse-engineering
Xanalyzer
xAnalyzer plugin for x64dbg
Stars: ✭ 553 (-39.63%)
Mutual labels:  cracking, reverse-engineering

Dwarf

PyPI pyversions PyPI version shields.io GitHub license GitHub issues

A debugger for reverse engineers, crackers and security analyst. Or you can call it damn, why are raspberries so fluffy or yet, duck warriors are rich as fuck. Whatever you like! Built on top of pyqt5, frida and some terrible code.

Known Issues

  • JavaTraceView is distorted
  • JavaTraceView shows weakref/handle instead of value

We are working on Dwarf 2.0 release

Installation

pip3 install dwarf-debugger

Development

pip3 install https://github.com/iGio90/Dwarf/archive/master.zip

Usage

Debugging UI (attach wizard)

dwarf

Debugging UI (straightforward)

dwarf -t android com.facebook.katana
dwarf -t android 2145
dwarf -t ios 2145
dwarf -t local /usr/bin/cat /etc/shadow

Debugging UI (own agent)

dwarf -t android -s /path/to/agent.js com.facebook.katana
dwarf -t local -s /path/to/agent.js /usr/bin/cat /etc/shadow

Dwarf typings + injector

$ dwarf-creator
project path (/home/igio90/test):
> 
project name (test):
> 
Session type (local)
[*] L (local)
[*] A (android)
[*] I (iOS)
[*] R (remote)

append i to use dwarf-injector (ai | android inject)
> ai
target package (com.whatsapp)
> com.whatsapp

$ (./intelliJ || ./vsCode).open(/home/igio90/test)
    .echo('enjoy scripting with frida and dwarf api autocompletition and in-line doc')

$ ./dwarf if myOs == 'unix' else 'dwarf.bat'

Dwarf trace

dwarf-trace -t android --java java.io.File.$init com.facebook.katana

* Trying to spawn com.facebook.katana
* Dwarf attached to 19337
java.io.File $init
    /data  - java.io.File
    misc

java.io.File $init
    /data/misc  - java.io.File
    user

...
dwarf-trace -t android --native --native-registers x0,x1,sp open+0x32
dwarf-trace -t android --native --native-registers x0,x1,sp [email protected]
dwarf-trace -t android --native --native-registers x0,x1,sp 0xdc00d0d0
dwarf-trace -t android --native --native-registers x0,x1,sp popen





Javascript | License | Become a patron | Slack

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].