frida.re
Open in
urlscan Pro
2a06:98c1:3121::3
Public Scan
Submitted URL: http://frida.re/?1.5.3-spam
Effective URL: https://frida.re/?1.5.3-spam
Submission: On March 16 via api from DE — Scanned from NL
Effective URL: https://frida.re/?1.5.3-spam
Submission: On March 16 via api from DE — Scanned from NL
Form analysis
0 forms found in the DOMText Content
* Overview * Docs * News * Code * Contact FЯIDA * Overview * Docs * News * Code * Contact Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. SCRIPTABLE Inject your own scripts into black box processes. Hook any function, spy on crypto APIs or trace private application code, no source code needed. Edit, hit save, and instantly see the results. All without compilation steps or program restarts. PORTABLE Works on Windows, macOS, GNU/Linux, iOS, watchOS, tvOS, Android, FreeBSD, and QNX. Install the Node.js bindings from npm, grab a Python package from PyPI, or use Frida through its Swift bindings, .NET bindings, Qt/Qml bindings, Go bindings, or C API. We also have a scalable footprint. FREE Frida is and will always be free software (free as in freedom). We want to empower the next generation of developer tools, and help other free software developers achieve interoperability through reverse engineering. BATTLE-TESTED We are proud that NowSecure is using Frida to do fast, deep analysis of mobile apps at scale. Frida has a comprehensive test-suite and has gone through years of rigorous testing across a broad range of use-cases. GET UP AND RUNNING IN SECONDS. Quick-start Instructions ~ $ pip install frida-tools ~ $ frida-trace -i "recv*" Twitter recvfrom: Auto-generated handler: …/recvfrom.js Started tracing 21 functions. 1442 ms recvfrom() # Live-edit recvfrom.js and watch the magic! 5374 ms recvfrom(socket=67, buffer=0x252a618, length=65536, flags=0, address=0xb0420bd8, address_len=16) SPONSORED BY: