<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel><title>inspection | Hugo Ferreira</title>
    <link>https://hugo.ferreira.cc/tags/inspection/</link>
    <description>Recent content in Inspection by Hugo Ferreira</description>
    <image>
      <title>inspection | Hugo Ferreira</title>
      <url>https://hugo.ferreira.cc/hf-bw.jpg</url>
      <link>https://hugo.ferreira.cc/tags/inspection/</link>
    </image>
    <generator>Hugo -- 0.124.1</generator>
    <language>en</language>
    <copyright>2000–2024 by Hugo Ferreira · CC BY 4.0</copyright>
    <lastBuildDate>Fri, 24 Jan 2014 07:07:28 +0000</lastBuildDate>
    <atom:link href="https://hugo.ferreira.cc/tags/inspection/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>🔗 Frida</title>
      <link>https://hugo.ferreira.cc/frida/</link>
      <pubDate>Fri, 24 Jan 2014 07:07:28 +0000</pubDate>
      <guid>https://hugo.ferreira.cc/frida/</guid>
      <description>Frida
Inject JavaScript to explore native apps on Windows, Mac, Linux and iOS.
Scriptable
Your own scripts get injected into black box processes to execute custom debugging logic. Hook any function, spy on crypto APIs or trace private application code, no source code needed!
Stalking
Stealthy code tracing without relying on software or hardware breakpoints. Think DTrace in user-space, based on dynamic recompilation, like DynamoRIO and PIN .
Quick-start Instructions</description>
      <content:encoded><![CDATA[<p><a href="http://www.frida.re/">Frida</a></p>
<blockquote>
<p>Inject JavaScript to explore native apps on Windows, Mac, Linux and
iOS.</p>
<p><strong>Scriptable</strong></p>
<p>Your own scripts get injected into black box processes to execute
custom debugging logic. Hook any function, spy on crypto APIs or trace
private application code, no source code needed!</p>
<p><strong>Stalking</strong></p>
<p>Stealthy code tracing without relying on software or hardware
breakpoints. Think <a href="http://en.wikipedia.org/wiki/DTrace">DTrace</a> in
user-space, based on dynamic recompilation, like
<a href="http://www.dynamorio.org/">DynamoRIO</a> and
<a href="http://software.intel.com/en-us/articles/pin-a-dynamic-binary-instrumentation-tool">PIN</a>
.</p>
<p><strong>Quick-start Instructions</strong></p>
<pre><code>      ~ $ sudo easy_install frida
      

      ~ $ frida-trace -i 'recv*' Skype
      

      recvfrom: Auto-generated handler: …/recvfrom.js
      

      Started tracing 21 functions.
      

      1442 ms recvfrom()
      

      # Live-edit recvfrom.js and watch the magic!
      

      5374 ms recvfrom(socket=67, buffer=0x252a618, length=65536, flags=0, address=0xb0420bd8, address_len=16)
</code></pre>
</blockquote>
]]></content:encoded>
    </item>
  </channel>
</rss>
