This article provides a comprehensive guide on Android reverse engineering tools, specifically focusing on IDA, Ghidra, Frida, GDA, and Flowdroid. It explains how to use Frida to attach an existing process and demonstrates its usage with WeChat as an example.

安卓反编译

ida ghidra frida

frida extension/helper methods

attach existing process

1
2
3
4
sudo frida-ps
sudo frida -n WeChat
sudo frida -p [pid]

gda 交互式Android反编译 支持数据流追踪

flowdroid

Comments