All Projects → nowsecure → R2frida

nowsecure / R2frida

Licence: mit
Radare2 and Frida better together.

Programming Languages

javascript
184084 projects - #8 most used programming language

Projects that are alternatives of or similar to R2frida

R2frida Wiki
This repo aims at providing practical examples on how to use r2frida
Stars: ✭ 168 (-72.46%)
Mutual labels:  static-analysis, radare2, frida, dynamic-analysis
Awesome Reverse Engineering
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Stars: ✭ 2,954 (+384.26%)
Mutual labels:  radare2, frida, android-security
Mobile Security Framework Mobsf
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+1574.1%)
Mutual labels:  static-analysis, dynamic-analysis, android-security
r2frida-book
The radare2 + frida book for Mobile Application assessment
Stars: ✭ 38 (-93.77%)
Mutual labels:  static-analysis, dynamic-analysis
allsafe
Intentionally vulnerable Android application.
Stars: ✭ 135 (-77.87%)
Mutual labels:  dynamic-analysis, frida
jitana
A graph-based static-dynamic hybrid DEX code analysis tool
Stars: ✭ 35 (-94.26%)
Mutual labels:  static-analysis, dynamic-analysis
Mobileapp Pentest Cheatsheet
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
Stars: ✭ 3,051 (+400.16%)
Mutual labels:  static-analysis, dynamic-analysis
ethereum-dasm
An ethereum evm bytecode disassembler and static/dynamic analysis tool
Stars: ✭ 121 (-80.16%)
Mutual labels:  static-analysis, dynamic-analysis
maloss
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages
Stars: ✭ 46 (-92.46%)
Mutual labels:  static-analysis, dynamic-analysis
rair-core
RAIR: RAdare In Rust
Stars: ✭ 63 (-89.67%)
Mutual labels:  static-analysis, radare2
Enlightn
Your performance & security consultant, an artisan command away.
Stars: ✭ 378 (-38.03%)
Mutual labels:  static-analysis, dynamic-analysis
awesome-malware-analysis
Defund the Police.
Stars: ✭ 9,181 (+1405.08%)
Mutual labels:  static-analysis, dynamic-analysis
aparoid
Static and dynamic Android application security analysis
Stars: ✭ 62 (-89.84%)
Mutual labels:  static-analysis, dynamic-analysis
tiro
TIRO - A hybrid iterative deobfuscation framework for Android applications
Stars: ✭ 20 (-96.72%)
Mutual labels:  static-analysis, dynamic-analysis
SDA
SDA is a rich cross-platform tool for reverse engineering that focused firstly on analysis of computer games. I'm trying to create a mix of the Ghidra, Cheat Engine and x64dbg. My tool will combine static and dynamic analysis of programs. Now SDA is being developed.
Stars: ✭ 98 (-83.93%)
Mutual labels:  static-analysis, dynamic-analysis
opem
OPEM (Open Source PEM Fuel Cell Simulation Tool)
Stars: ✭ 107 (-82.46%)
Mutual labels:  static-analysis, dynamic-analysis
Medusa
Binary instrumentation framework based on FRIDA
Stars: ✭ 258 (-57.7%)
Mutual labels:  frida, dynamic-analysis
Crosshair
An analysis tool for Python that blurs the line between testing and type systems.
Stars: ✭ 586 (-3.93%)
Mutual labels:  static-analysis, dynamic-analysis
Saferwall
A hackable malware sandbox for the 21st Century
Stars: ✭ 419 (-31.31%)
Mutual labels:  static-analysis, dynamic-analysis
Insider
Static Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and easy to implement software inside your DevOps pipeline. Support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET Full Framework, C#, and Javascript (Node.js).
Stars: ✭ 216 (-64.59%)
Mutual labels:  static-analysis, android-security

r2frida

Radare2 and Frida better together.

Build

logo

Description

One of the main aims of the radare project is to provide a complete toolchain for reverse engineering, providing well maintained functionalities and extend its features with other programming languages and tools.

Frida is a dynamic instrumentation toolkit that makes it easy to inspect and manipulate running processes by injecting your own JavaScript, and optionally also communicate with your scripts.

For more information about those projects:

Installation

In GNU/Debian you will need to install the following packages:

$ sudo apt install -y make gcc libzip-dev nodejs npm curl pkg-config git

The recommended way to install r2frida is via r2pm:

$ r2pm -ci r2frida

But you can always follow the standard way in here:

$ git clone --recursive https://github.com/nowsecure/r2frida.git
$ cd r2frida
$ make
$ sudo make install

On Windows:

  • Make sure you have these installed:
    • Visual Studio 15 or later
    • npm
    • Cygwin or MSYS2
  • Open a Command Prompt in the r2frida folder and run:
[Visual Studio Path]\VC\Auxiliary\Build\vcvarsall.bat [Your arch]
.\build.bat install

Usage:

r2frida is used from r2 by specifying a process name:

$ r2 frida://Twitter

Or a PID:

$ r2 frida://1234

Or the absolute path of a binary to spawn:

$ r2 frida:///bin/ls

also with arguments:

$ r2 frida://"/bin/ls -al"

Alternatively also with a device ID that you retrieved through frida-ls-devices:

$ r2 frida://device-id/Twitter

you can spawn an app on the device too, with an extra / and the package name (you can retrieve package names with frida-ps):

$ r2 frida://device-id//com.atebits.Tweetie2

Termux

If you are willing to install and use r2frida natively on Android via Termux, there are some caveats with the library dependencies because of some symbol resolutions. The way to make this work is by extending the LD_LIBRARY_PATH environment to point to the system directory before the termux libdir.

$ LD_LIBRARY_PATH=/system/lib64:$LD_LIBRARY_PATH r2 frida://...

To debug plugin loading problems use the following environment variable and grep for frida:

$ R_DEBUG=1 r2 -

Design

 +---------+
 | radare2 |      The radare2 tool, on top of the rest
 +---------+
      :
      :
+-----------+
| io_frida  |     r2frida io plugin
+-----------+
      :
      :
 +---------+
 |  frida  |      Frida host APIs and logic to interact with target
 +---------+
      :
      :
  +--------+
  | target |      Target process instrumented by Frida and Javascript
  +--------+

Credits

This tool has been developed by pancake aka Sergi Alvarez for NowSecure.

I would like to thank Ole André for being so nice answering and fix bugs in Frida without those patches that would not be possible.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].