Skip to content

Dochizame is an interactive GUI, which intercepts android functions. It hooks alternative native call functions and modifies its variables on live remotely.

Notifications You must be signed in to change notification settings

truefinder/dochizame

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Dochizame

Dochizame is frida based GUI inspector suite for pentester

  • Intercept almost every C/C++ based function from your smartphone
  • Also Modify argument values and return value
  • Modify values synchronusly with GUI editor
  • Dynamically intercept and release

Prerequisite

Below open source projects are used for dochizame working properly :

  • [frida] - Hooking tool
  • [frida-qml] - Frida's Qt wrapper
  • [Qt5] - Multiplatform Qt GUI library
  • [Qt Creator] - Qt IDE for user interface design
  • [xcode] - Apple's developer tool
  • [node.js] - Javascript runtime

Build

Open project on Qt Creator and just compile it

How to run

(on Android )

$gcc -o native target/native.c 
$adb put native /data/local/tmp/
$adb shell
android$ cd /data/local/tmp
android$ chmod 755 native 
android $./native 

(on your PC)

  • Open Dochizame.app (if on Mac)

  • Choose process (select device & process )

Screen Shot 2022-01-18 at 14 52 13

  • Choose module (select module & write function address)

Screen Shot 2022-01-18 at 14 52 40

  • Modify values

Screen Shot 2022-01-18 at 14 53 02

  • Check result

Screen Shot 2022-01-18 at 14 52 53

Contacts

Seunghyun Seo

About

Dochizame is an interactive GUI, which intercepts android functions. It hooks alternative native call functions and modifies its variables on live remotely.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published