ikoz / jdwp-lib-injector

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

JDWP library injector script

What is it ?

This script can be used to inject native shared libraries into debuggable Android applications. It was mainly developed for injecting the Frida gadget library on non-rooted devices.

How does it work?

The script can inject any library, however in this example we will be injecting Frida gadget.

  1. Download the correct gadget for your architecture (arm/arm64/x86/x86_64) from https://github.com/frida/frida/releases/
  2. On your device go to Developer options, "Select debug app" and select the desired application.
  3. In the same screen, enable the "Wait for debugger" option
  4. Start the application you want to inject the library into - this will pause waiting for a debugger to be connected.
  5. On your shell, run ./jdwp-lib-injector.sh frida-gadget-10.1.5-android-arm64.so or similar.

For more information, please visit https://koz.io/library-injection-for-debuggable-android-apps/

Development

This script is based on jdwp-shellifier by @_hugsy_, modified to facilitate library loading. The original README of jdwp-shellifier is at README-shellifier.md. Also included: a simple orchestration shell script to be used by end users.

About

License:MIT License


Languages

Language:Python 97.3%Language:Shell 2.7%