Skip to content

a reverse engineering tool for android cocos2d-js engine application.

License

Notifications You must be signed in to change notification settings

Mas0nShi/jscHookR

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

jscHookR

TL;DR

a reverse engineering tool for android cocos2d-js engine application.

support dump and replace .jsc files.

Usage

Note: use android-frida-server at least 16.0.0+

  1. 🔧 Install

    git clone https://github.com/Mas0nShi/jscHookR
    pip3 install -r requirements.txt
    cd jscHookR

    ⚠️ Tips: You can edit requirements.txt to avoid environment pollution. (frida & frida-tools)

  2. 📱 Start frida-server

    use your debuggable android device or emulator, download suitable frida-server, push to device and run it.

    e.g.

     adb push frida-server-16.0.0-android-arm64 /data/local/tmp/frida-server
     adb shell chmod +x /data/local/tmp/frida-server
     adb shell /data/local/tmp/frida-server &
  3. ☕️ Enjoy it

    e.g.

    # Dump .jsc files
    python3 frida-jsc-hook.py -p com.mas0n.testApp -d -o . 
    # Replace .jsc files
    python3 frida-jsc-hook.py -p com.mas0n.testApp -r -i ./com.mas0n.testApp

Features

  • dump scripts loaded by cocos2d-js engine.
  • runtime replace (include no-filename scripts)

Preview

preview

About

a reverse engineering tool for android cocos2d-js engine application.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published