Dwarf - Amount Featured Multi Arch/Os Debugger Built On Elevation Of Pyqt5 As Well As Frida


Influenza A virus subtype H5N1 debugger for reverse engineers, crackers together with safety analyst. Or you lot tin telephone telephone it damn, why are raspberries together with thus fluffy or yet, duck warriors are rich every bit fuck. Whatever you lot like! Built on transcend of pyqt5, frida together with about terrible code.

Checkout the website for features, api together with examples
CHANGELOG

Something you lot tin exercise amongst Dwarf
  • breakpoints
  • watchpoints without hardware support
  • visual emulation amongst car map from target, reporting retention accesses
  • breaks module loading cycle, coffee classes
  • set breaks weather condition together with custom logics
  • inject code on each breakpointed thread
  • exchange information amongst your target together with display it inwards UI
  • digging through memory, disassembly together with jvm fields/functions
  • backtrace both native together with java
  • takes your whole frida agent inwards script editor, convert hooks to breakpoints etc
  • more...
  • all of this tin endure done through scripting to construct custom debugging logic

Pre requisites
Influenza A virus subtype H5N1 frida server running anywhere.

Android Session:
  • make certain you lot tin utilisation 'adb' ascendance inwards console or Read here
  • root on the device/emulator is required!
  • make certain frida is inwards /system/bin|xbin amongst a+x permissions or eventually utilisation Dwarf to automatically install latest frida server

Setup together with run
git clone https://github.com/iGio90/Dwarf  cd Dwarf  pip3 install -r requirements.txt  python3 dwarf.py

Optionally
You tin install keystone-engine to enable assembler:
Windows x86: https://github.com/keystone-engine/keystone/releases/download/0.9.1/keystone-0.9.1-python-win32.msi x64: https://github.com/keystone-engine/keystone/releases/download/0.9.1/keystone-0.9.1-python-win64.msi  OSX / Unix pip3 install keystone-engine
dex2jar tools (required for baksmali/decompiling)
Guide: https://sourceforge.net/p/dex2jar/wiki/UserGuide/ Files: https://github.com/pxb1988/dex2jar/releases  On Windows add together d2j folder to %PATH% together with change: 'java -Xms512m -Xmx1024m -cp "%CP%" %*' inwards d2j_invoke.bat to 'java -Xms512m -Xmx4096m -cp "%CP%" %*'

Settings
You tin modify inwards .dwarf
"dwarf_ui_hexedit_bpl": 32 (default: 16) - Bytes per line of piece of occupation inwards hexview "dwarf_ui_hexstyle": "upper", "lower" (default: "upper") - overall hexstyle 0xabcdef or 0xABCDEF (note: click on the "Offset (X)" inwards hexview to change) "dwarf_ui_font_size": 12 (default: 12) - (note: hexview/disasm utilisation other font facial expression for settingsdlg or modify lib/utils.py get_os_monospace_font())