安卓

安卓抓包

tcpdump
http://www.androidtcpdump.com/
./tcpdump -i any -p -s 0 -w /sdcard/capture.pcap

frida

adb push frida-server /data/local/tmp/
adb shell
su
cd /data/local/tmp/
chmod 777 frida-server
./frida-server &
adb forward tcp:27042 tcp:27042

js api

函数重载和构造函数
var sclass = Java.use(“xxx.class”);
sclass.$new.overload(‘java.lang.String’, ‘int’).implementation = function() {

查看窗口栈

adb shell
dumpsys window

xposed

https://github.com/ac-pm/Inspeckage
开启debug https://github.com/pylerSM/XInstaller

脱壳

patch 安卓模拟器源码进行脱壳 https://github.com/CheckPointSW/android_unpacker

抓包解密

https://github.com/federicodotta/Brida/
http://bobao.360.cn/learning/detail/4209.html

工具

安卓shell https://termux.com/
adb下载 https://developer.android.com/studio/releases/platform-tools.html
源码静态分析(可能可以改造) https://github.com/blackarbiter/Android_Code_Arbiter (https://tech.meituan.com/Android-Code-Arbiter.html)

分享到 评论