JimmyJones97 / android_analysis

a few android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

chinglish document

how to build

android studio build , must debug, some bug in release that dobby dont work 

tools lib will in app/libs/arm64-v8a

libnative_hook.so : trace jni
libssl2.so : hook ssl key log 
sniffer.so : use tcpdum to capture specified app packet, must put it and tcpdump on /data

how to use and function

1. frida printf help class
    project/frida/frida_helper.js can help you convert object to string,using inject fastjson and gjson by xposed. 
2. capture a app packet
  put sniffer.so and tcpdump on /data
  use cmd: ./sniffer.so com.xxxx pacp_name , and ctrl-c stop capture , save to /sdcard/com.xxxx_pacp_name.pcap
3. hook ssl key log
  inject libssl2.so by yourself, packet.txt will write in /sdcard/Android/com.xxxxx/packet.txt, need some sdcard permission
4. trace all java2c, c2java jni call log
  put libnative_hook.so  in /data/app , and chmod 777,  use project/frida/analyse.js to inject it in your target app
  and do this before:
  write your target packet name on packet_name
  write your target trace lib name on target_name
  
  use use_file_log() can write log in file ,if not will wirte in android log
  must enable frida printf help class, or undefine USE_IN_JAVA_PARSE
  other:
  arm32 is bug, fix bug by yourself

wecome to give me money, qq is 734248537, see you leite

About

a few android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog


Languages

Language:C 61.0%Language:C++ 31.8%Language:Java 5.8%Language:C# 0.7%Language:CMake 0.3%Language:Makefile 0.2%Language:Assembly 0.1%Language:Python 0.0%Language:JavaScript 0.0%Language:Shell 0.0%Language:Objective-C++ 0.0%Language:Dockerfile 0.0%