wallbreaker

πŸ”¨ Break Java Reverse Engineering form Memory World!


Keywords
frida, android, wallbreaker, objectdump, objectsearch, classdump, classsearch, debug, debugger, java, python, reverseengineering, security
License
GPL-3.0
Install
pip install wallbreaker==1.0.3

Documentation

Wallbreaker

πŸ”¨ Break Java Reverse Engineering form Memory World!

WTF?

Wallbreaker is a useful tool to live analyzing Java heap, powered by frida. Provide some commands to search object or class from the memory, and beautifully visualize the real structure of the target.

Want to know real data content? list item? map entries? Want to know about implementation of the interface? Try it! What you see is what you get!

How to start?

1. Install objection

pip3 install objection

2. Download wallbreaker

mkdir -p ~/.objection/plugins/
git clone https://github.com/hluwa/Wallbreaker ~/.objection/plugins/Wallbreaker

3. Loading as objection plugin

objection -g com.app.name explore -P ~/.objection/plugins

or

objection -g com.app.name explore
plugin load ~/.objection/plugins/Wallbreaker

4. Use wallbreaker command

plugin wallbreaker objectsearch java.util.HashMap
plugin wallbreaker objectdump <object-handle>

Commands

Search

wallbreaker classsearch <type-pattern>
[return all matched class]
wallbreaker objectsearch <instance-class-name>
[return all matched object-handle and toString]

Dump

wallbreaker classdump <class-name> [--fullname]
[
   pretty print class structure: fields declare, static field value, methods declare.
      set --fullname to display package name of type name.
]
wallbreaker objectdump <object-handle> [--fullname] [--as-class class-name]
[
   pretty print object structure: fields declare and value, methods declare.
      set --fullname to display package name of type name;
      set --as-class to cast instance type(super class, not interface).
   if instance is a collection or map, dump all entries.
]

Demo

asciicast