PRACTICAL EXAMPLES WITH FRIDA Frida VS Anti-Debug Techniques on Windows (II)
24 August 2021
In this second post of the series “PRACTICAL EXAMPLES WITH FRIDA – Frida VS Anti-Debug Techniques on Windows” we will start with showing examples of bypassing anti-debug techniques. As announced in our first post, in this entry we will talk about the first group of anti-debug techniques: “Techniques based…
Since the beginning of our activity, in Layakk we have been studying the security of mobile communications for years, in different areas: network access protocols, core network protocols and specific implementations (in the baseband of the terminals and in different elements of the network of the operator). Apart from…
This series of articles in our blog is motivated by the amount of news circulating with headlines like “Android malware steals your bank details”, “Malware that won’t uninstall from your Android”, “Malware that reinstalls without you noticing”…. The question is, how does it work at the system level, how…
PRACTICAL EXAMPLES WITH FRIDA Frida VS Anti-Debug Techniques on Windows (I)
4 February 2021
In this series of entries we are going to show practical examples of how to use Frida to bypass anti-debug techniques that some applications implement. This series begins with a short description of what Frida is, presenting the environment we will use for the examples we show later; followed…
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.