Android reverse using frida-dexdump for shelling

1. Library installation

pip install frida-dexdump

2. Shelling process

1. Root the phone or emulator
2. Start the frida-server service
3. Find a folder and enter cmd
4. Start frida-dexdump

The execution code is as follows:

frida-ps -U -a     # 查看包名
frida-dexdump -U -f 包名      # 脱壳

Or open the app and run

frida-dexdump -FU -d -o .

The following indicates that the unpacking is successful:

insert image description here

Guess you like

Origin blog.csdn.net/weixin_51111267/article/details/130656357