In this post and the next few posts we will talk about Frida the Dynamic Binary Instrumentation tool, I will show you some examples that highlight what Frida can do, We will work on small android applications that i wrote, the source code of these apps will be available on github, so let’s start.

One more thing, you should take a look first at the documentation, I will not repeat the documentation, I will show you examples that can make the documentation more understandable.


You can check the Quick-Start guide from the official documentation, and installing the android server, this should be straight forward.

You will also need android development environment if you will build the code yourself, or you can download the APK.

You will need root access on an android device to follow this tutorial, you may use a physical device, but i will be using an emulator(Android 6.0 x86).

And i will be using python 2.7 .

Example #1

public class my_activity extends AppCompatActivity {

    protected void onCreate(Bundle savedInstanceState) {
        while (true){

            try {
            } catch (InterruptedException e) {


    void fun(int x , int y ){
        Log.d("Sum" , String.valueOf(x+y));


This snippet is a part of the android code, onCreate will be called when the app runs, it waits for 1 second and then calls function fun , and repeats forever.

Function fun will print the sum of the two arguments (80), logs can be viewed using logcat.

output of unmodified code

Now, we will use frida to change this result and these are the steps that we will follow:

  1. start frida server
  2. install the APK
  3. run the APK and attach frida to the app.
  4. hook the calls to function fun
  5. modify the arguments as we wish
Step 1:

Getting a root shell on the android emulator and executing frida-server.

Note: Make sure that adb is in your PATH variable.

PS C:\Users\11x256> adb shell
root@generic_x86:/ # /data/local/tmp/frida-server &
Step 2:

Installing the APK on the device

PS C:\Users\11x256> adb install .\Desktop\app-1.apk
.\Desktop\app-1.apk: 1 file pushed. 49.0 MB/s (1573086 bytes in 0.031s)
        pkg: /data/local/tmp/app-1.apk
Step 3:

Frida injects Javascript into processes so we will write Javascript code, and it has python bindings so will write python to automate frida.

#python code
import frida
import time
device = frida.get_usb_device()
pid = device.spawn(["com.example.a11x256.frida_test"])
time.sleep(1) #Without it Java.perform silently fails
session = device.attach(pid)
script = session.create_script(open("s1.js").read())

#prevent the python script from terminating

This piece of code will get the usb device (which is an android emulator in my case), starts the process, attaches to it and resumes that process.

You can get the package name from the APK as follows:

remnux@remnux:~/Desktop$ apktool d app-1.apk 
remnux@remnux:~/Desktop$ grep "package" ./app-1/AndroidManifest.xml 
<manifest xmlns:android="" package="com.example.a11x256.frida_test" platformBuildVersionCode="25" platformBuildVersionName="7.1.1">

Step 4&5:

Now we want to write some JS code that will be injected into the running process to extract/modify the arguments of the function call.

We already know the name of the function fun and the class that contains it main_activity.

console.log("Script loaded successfully ");
Java.perform(function x(){ //Silently fails without the sleep from the python code
    console.log("Inside java perform function");
    //get a wrapper for our class
    var my_class = Java.use("com.example.a11x256.frida_test.my_activity");
    //replace the original implmenetation of the function `fun` with our custom function = function(x,y){
    //print the original arguments
    console.log( "original call: fun("+ x + ", " + y + ")");
    //call the original implementation of `fun` with args (2,5)
    var ret_value =,5);
    return ret_value;

The result:

The function is now called with our arguments(2,5)output of unmodified code

The output of console.log appears in the python console.

output of console.log


Example 1