# drawf-wsa **Repository Path**: dong_rong/drawf-wsa ## Basic Information - **Project Name**: drawf-wsa - **Description**: 基于某开源项目二次开发的安卓调试器,可以调试java,x86 架构下 so层 ,houdini转译的 arm so层,下断点,读寄存器,内存查看修改等操作 - **Primary Language**: JavaScript - **License**: GPL-3.0 - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 3 - **Created**: 2023-03-03 - **Last Updated**: 2023-12-28 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Dwarf [](https://pypi.python.org/pypi/dwarf_debugger/) [](https://pypi.python.org/pypi/dwarf_debugger/) [](https://github.com/iGio90/Dwarf/blob/master/LICENSE) [](https://GitHub.com/iGio90/Dwarf/issues/) A debugger for reverse engineers, crackers and security analyst. Or you can call it damn, why are raspberries so fluffy or yet, duck warriors are rich as fuck. Whatever you like! Built on top of pyqt5, frida and some terrible code. ### Known Issues + JavaTraceView is distorted + JavaTraceView shows weakref/handle instead of value We are working on Dwarf 2.0 release ### Installation ``` pip3 install dwarf-debugger ``` Development ``` pip3 install https://github.com/iGio90/Dwarf/archive/master.zip ``` ## Usage #### Debugging UI (attach wizard) ``` dwarf ``` #### Debugging UI (straightforward) ``` dwarf -t android com.facebook.katana dwarf -t android 2145 dwarf -t ios 2145 dwarf -t local /usr/bin/cat /etc/shadow ``` #### Debugging UI (own agent) ``` dwarf -t android -s /path/to/agent.js com.facebook.katana dwarf -t local -s /path/to/agent.js /usr/bin/cat /etc/shadow ``` #### Dwarf typings + injector ``` $ dwarf-creator project path (/home/igio90/test): > project name (test): > Session type (local) [*] L (local) [*] A (android) [*] I (iOS) [*] R (remote) append i to use dwarf-injector (ai | android inject) > ai target package (com.whatsapp) > com.whatsapp $ (./intelliJ || ./vsCode).open(/home/igio90/test) .echo('enjoy scripting with frida and dwarf api autocompletition and in-line doc') $ ./dwarf if myOs == 'unix' else 'dwarf.bat' ``` #### Dwarf trace ``` dwarf-trace -t android --java java.io.File.$init com.facebook.katana * Trying to spawn com.facebook.katana * Dwarf attached to 19337 java.io.File $init /data - java.io.File misc java.io.File $init /data/misc - java.io.File user ... ``` ``` dwarf-trace -t android --native --native-registers x0,x1,sp open+0x32 dwarf-trace -t android --native --native-registers x0,x1,sp targetModule@0x1234 dwarf-trace -t android --native --native-registers x0,x1,sp 0xdc00d0d0 dwarf-trace -t android --native --native-registers x0,x1,sp popen ```