Using Frida for Reverse Engineering

@mkhdznfq published an interesting write-up of this year’s FLARE On challenge number eight at He used Frida to instrument the challenge’s Android app. This allowed him to easily obtain the required data without the need for deep static analysis or setting up a debugging environment. I decided to try the tool to aid in reverse engineering. While most of the tutorials I’ve discovered focus on using Frida on Android in this post, I will cover some of my first experiences with Frida for instrumenting Windows PE files.

One Reply to “Using Frida for Reverse Engineering”

  1. I can only read the introduction paragraph for your last 3 posts – I think something went wrong there 😉 However, I really enjoyed your other posts.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.