Frida Commands

The commands here can be found using \? or =! when a binary is loaded using frida by r2 frida:///path/to/binary or pip

  • \? Show this help
  • \?V Show target Frida version
  • \/[j] <string|hexpairs> Search hex/string pattern in memory ranges (see search.in=?)
  • \/w[j] string Search wide string
  • \/v[1248][j] value Search for a value honoring e cfg.bigendian of given width
  • \i Show target information
  • \ii[*] List imports
  • \il List libraries
  • \is[*] <lib> List exports/entrypoints of lib
  • \isa[*] (<lib>) <sym> Show address of symbol
  • \ic <class> List Objective-C classes or methods of \<class>
  • \ip <protocol> List Objective-C protocols or methods of \<protocol>
  • \fd[*j] <address> Inverse symbol resolution
  • \dd[-][fd] ([newfd]) List, dup2 or close filedescriptors
  • \dm[.|j|*] Show memory regions
  • \dma <size> Allocate \<size> bytes on the heap, address is returned
  • \dmas <string> Allocate a string inited with \<string> on the heap
  • \dmad <addr> <size> Allocate \<size> bytes on the heap, copy contents from \<addr>
  • \dmal List live heap allocations created with dma[s]
  • \dma- (<addr>...) Kill the allocations at (or all of them without param)
  • \dmp <addr> <size> <perms> Change page at \<address> with \<size>, protection \<perms> (rwx)
  • \dp Show current pid
  • \dpt Show threads
  • \dr Show thread registers (see dpt)
  • \env [k[=v]] Get/set environment variable
  • \dl libname Dlopen a library
  • \dl2 libname [main] Inject library using Frida's >= 8.2 new API
  • \dt <addr> .. Trace list of addresses
  • \dt- Clear all tracing
  • \dtr <addr> (<regs>...) Trace register values
  • \dtf <addr> [fmt] Trace address with format (^ixzO) (see dtf?)

    Usage: dtf [format] || dtf [addr] [fmt] ^ = trace onEnter instead of onExit + = show backtrace on trace x = show hexadecimal argument i = show decimal argument z = show pointer to string O = show pointer to ObjC object

  • \dtSf[*j] [sym|addr] Trace address or symbol using the stalker (Frida >= 10.3.13)

  • \dtS[*j] seconds Trace all threads for given seconds using the stalker
  • \di[0,1,-1] [addr] Intercept and replace return value of address
  • \dx [hexpairs] Inject code and execute it (TODO)
  • \dxc [sym|addr] [args..] Call the target symbol with given args
  • \e[?] [a[=b]] List/get/set config evaluable vars
  • \. script Run script
  • \<space> code.. Evaluate Cycript code
  • \eval code.. Evaluate Javascript code in agent side
  • \dc Continue