frida.re Open in urlscan Pro
2a06:98c1:3121::3  Public Scan

Submitted URL: http://frida.re/?1.5.3-spam
Effective URL: https://frida.re/?1.5.3-spam
Submission: On March 16 via api from DE — Scanned from NL

Form analysis 0 forms found in the DOM

Text Content

 * Overview
 * Docs
 * News
 * Code
 * Contact

FЯIDA
 * Overview
 * Docs
 * News
 * Code
 * Contact

Dynamic instrumentation toolkit for developers, reverse-engineers, and security
researchers.


SCRIPTABLE

Inject your own scripts into black box processes. Hook any function, spy on
crypto APIs or trace private application code, no source code needed. Edit, hit
save, and instantly see the results. All without compilation steps or program
restarts.


PORTABLE

Works on Windows, macOS, GNU/Linux, iOS, watchOS, tvOS, Android, FreeBSD, and
QNX. Install the Node.js bindings from npm, grab a Python package from PyPI, or
use Frida through its Swift bindings, .NET bindings, Qt/Qml bindings, Go
bindings, or C API. We also have a scalable footprint.


FREE

Frida is and will always be free software (free as in freedom). We want to
empower the next generation of developer tools, and help other free software
developers achieve interoperability through reverse engineering.


BATTLE-TESTED

We are proud that NowSecure is using Frida to do fast, deep analysis of mobile
apps at scale. Frida has a comprehensive test-suite and has gone through years
of rigorous testing across a broad range of use-cases.



GET UP AND RUNNING IN SECONDS.

Quick-start Instructions

~ $ pip install frida-tools

~ $ frida-trace -i "recv*" Twitter

recvfrom: Auto-generated handler: …/recvfrom.js

Started tracing 21 functions.

1442 ms    recvfrom()

# Live-edit recvfrom.js and watch the magic!

5374 ms    recvfrom(socket=67, buffer=0x252a618, length=65536, flags=0,
address=0xb0420bd8, address_len=16)



SPONSORED BY: