Frida Dynamic Application Tracing Framework Release 12.10

Submitted by release of the dynamic tracing and application analysis platform frida 12.10, which can be considered as an analogue of Greasemonkey for native programs, allowing you to control the operation of the program during its execution, just as Greasemonkey gives you the ability to control the processing of web pages. Program trace is supported on Linux, Windows, macOS, Android, iOS, and QNX platforms. Source texts of all project components extend under a free license wxWindows Library License (a variant of the LGPL that does not impose restrictions on distribution terms for binary assemblies of derivative works).

In terms of tasks, Frida resembles DTrace in user space, but JavaScript is used to write scripts for tracing and processing application execution statistics. Handlers have full access to the process's memory, can intercept function calls, and call functions implemented in the application from JavaScript code. The core components of Frida are written using C and Vala languages. The V8 engine is used to process JavaScript. There are Frida API bindings for Node.js, Python, Swift, .NET, Qt/Qml, and C.

The new release significantly expands the debugging, tracing and reverse engineering capabilities of Java programs - in the module frida-java-bridge HotSpot JVM support has been added, which allows you to use this layer not only for Android, but for ordinary Java programs using the JDK. Java method tracing has been added to the frida-trace utility. A new Java.enumerateMethods(query) API has been proposed to determine the execution of Java methods that match certain criteria. Requests for intercepting methods are specified in the form "class!method". Non-Java related changes include improved support for 32-bit ARM systems in the tracing engine stalker and the implementation of adaptive optimization, which made it possible to speed up the execution of Stalker by up to five times.

Source: opennet.ru

Add a comment