a reverse engineering tool for android cocos2d-js engine application.
support dump and replace .jsc files.
Note: use android-frida-server at least 16.0.0+
-
🔧 Install
git clone https://github.com/Mas0nShi/jscHookR pip3 install -r requirements.txt cd jscHookR
⚠️ Tips: You can edit requirements.txt to avoid environment pollution. (frida & frida-tools) -
📱 Start frida-server
use your debuggable android device or emulator, download suitable frida-server, push to device and run it.
e.g.
adb push frida-server-16.0.0-android-arm64 /data/local/tmp/frida-server adb shell chmod +x /data/local/tmp/frida-server adb shell /data/local/tmp/frida-server &
-
☕️ Enjoy it
e.g.
# Dump .jsc files python3 frida-jsc-hook.py -p com.mas0n.testApp -d -o . # Replace .jsc files python3 frida-jsc-hook.py -p com.mas0n.testApp -r -i ./com.mas0n.testApp
- dump scripts loaded by cocos2d-js engine.
- runtime replace (include no-filename scripts)