Frida Commands
The commands here can be found using \?
or =!
when a binary is loaded using frida by r2 frida:///path/to/binary or pip
\?
Show this help\?V
Show target Frida version\/[j] <string|hexpairs>
Search hex/string pattern in memory ranges (see search.in=?)\/w[j] string
Search wide string\/v[1248][j] value
Search for a value honoringe cfg.bigendian
of given width\i
Show target information\ii[*]
List imports\il
List libraries\is[*] <lib>
List exports/entrypoints of lib\isa[*] (<lib>) <sym>
Show address of symbol\ic <class>
List Objective-C classes or methods of \<class>\ip <protocol>
List Objective-C protocols or methods of \<protocol>\fd[*j] <address>
Inverse symbol resolution\dd[-][fd] ([newfd])
List, dup2 or close filedescriptors\dm[.|j|*]
Show memory regions\dma <size>
Allocate \<size> bytes on the heap, address is returned\dmas <string>
Allocate a string inited with \<string> on the heap\dmad <addr> <size>
Allocate \<size> bytes on the heap, copy contents from \<addr>\dmal
List live heap allocations created with dma[s]\dma- (<addr>...)
Kill the allocations at(or all of them without param) \dmp <addr> <size> <perms>
Change page at \<address> with \<size>, protection \<perms> (rwx)\dp
Show current pid\dpt
Show threads\dr
Show thread registers (see dpt)\env [k[=v]]
Get/set environment variable\dl libname
Dlopen a library\dl2 libname [main]
Inject library using Frida's >= 8.2 new API\dt <addr> ..
Trace list of addresses\dt-
Clear all tracing\dtr <addr> (<regs>...)
Trace register values-
\dtf <addr> [fmt]
Trace address with format (^ixzO) (see dtf?)Usage: dtf [format] || dtf [addr] [fmt] ^ = trace onEnter instead of onExit + = show backtrace on trace x = show hexadecimal argument i = show decimal argument z = show pointer to string O = show pointer to ObjC object
-
\dtSf[*j] [sym|addr]
Trace address or symbol using the stalker (Frida >= 10.3.13) \dtS[*j] seconds
Trace all threads for given seconds using the stalker\di[0,1,-1] [addr]
Intercept and replace return value of address\dx [hexpairs]
Inject code and execute it (TODO)\dxc [sym|addr] [args..]
Call the target symbol with given args\e[?] [a[=b]]
List/get/set config evaluable vars\. script
Run script\<space> code..
Evaluate Cycript code\eval code..
Evaluate Javascript code in agent side\dc
Continue