Skills2026年5月4日·1 分钟阅读

Frida — Dynamic Instrumentation Toolkit for Security Research

A cross-platform dynamic instrumentation toolkit that lets you inject JavaScript into native apps on Windows, macOS, Linux, iOS, and Android.

Agent 就绪

这个资产可以被 Agent 直接读取和安装

TokRepo 同时提供通用 CLI 命令、安装契约、metadata JSON、按适配器生成的安装计划和原始内容链接,方便 Agent 判断适配度、风险和下一步动作。

Native · 98/100策略:允许
Agent 入口
任意 MCP/CLI Agent
类型
Skill
安装
Single
信任
信任等级:Established
入口
Frida Overview
通用 CLI 安装命令
npx tokrepo install 13471d8c-47f9-11f1-9bc6-00163e2b0d79

Introduction

Frida is a dynamic instrumentation toolkit that lets security researchers inject snippets of JavaScript into native applications at runtime. It works across Windows, macOS, Linux, iOS, Android, and QNX, making it the go-to tool for mobile app security testing, API hooking, and reverse engineering.

What Frida Does

  • Injects JavaScript into native processes to hook and replace function implementations
  • Intercepts function calls, modifies arguments and return values at runtime
  • Traces API calls across native libraries without recompilation
  • Provides REPL-based and script-based workflows for interactive analysis
  • Works on desktop and mobile platforms including jailbroken and rooted devices

Architecture Overview

Frida consists of a core engine written in C that injects a QuickJS or V8 runtime into the target process. A Python-based client communicates with the injected agent over a custom protocol. On mobile devices, a frida-server daemon runs on the device and brokers connections. The Gum library provides the low-level hooking primitives (Interceptor, Stalker, Memory) that JavaScript scripts call through bindings.

Self-Hosting & Configuration

  • Install the Python client with pip install frida-tools
  • Push frida-server to Android/iOS devices for mobile instrumentation
  • Use USB or network transport to connect to mobile targets
  • Write hook scripts in JavaScript using the Frida API
  • Integrate with Objection for automated mobile app security testing

Key Features

  • Interceptor API for hooking native functions with JavaScript callbacks
  • Stalker engine for code tracing and coverage collection
  • Java and ObjC bridge APIs for hooking managed code on Android and iOS
  • Process memory scanning and allocation for runtime patching
  • Supports spawning, attaching, and child-gating for process lifecycle control

Comparison with Similar Tools

  • Xposed Framework — Android-only, requires device modification, hooks at the Java level
  • Cydia Substrate — iOS-focused hooking framework, less cross-platform
  • DynamoRIO — binary instrumentation framework, lower-level C API without JavaScript
  • Pin — Intel's dynamic binary instrumentation, x86-only and research-focused

FAQ

Q: Does Frida require root/jailbreak? A: For full instrumentation on mobile, root (Android) or jailbreak (iOS) is typically needed. On desktop, standard user privileges suffice for processes you own.

Q: Can I use Frida for app security testing? A: Yes. Frida is widely used in mobile penetration testing to bypass SSL pinning, analyze API calls, and test authentication mechanisms with proper authorization.

Q: What languages can I write Frida scripts in? A: Hook scripts are written in JavaScript. The client-side tooling supports Python, Node.js, Swift, .NET, and other languages via bindings.

Q: How does Frida's performance impact the target? A: Interceptor hooks add minimal overhead per call. Stalker (full code tracing) has higher overhead but can be scoped to specific threads or address ranges.

Sources

讨论

登录后参与讨论。
还没有评论,来写第一条吧。

相关资产