Frida 16.7.0 is out w/ brand new APIs for observing the lifecycles of threads and modules, a profiler and multiple samplers for measuring cycles/time/etc., MemoryAccessMonitor providing access to thread ID and registers, and more 🎉
Attending FOSDEM 2025 this weekend? Let's try to get an informal Frida meetup set up! Join our fosdem channel on Discord to coordinate. (Link to follow.)
How to track which instruction modifies a specific memory location or finding the memory address of your target value? This video covers how to use Frida’s new setHardwareBreakpoint API to tackle these challenges!
@fridadotre@oleavr@mobilesecurity_piped.video/qmvp0OgatR0
You can now sponsor @fridadotre on GitHub to help fund development of Frida, which forms the backbone of plenty of reverse engineering techniques & tools.
HTTP Toolkit just signed up as the first sponsor! You can help support them too here: github.com/sponsors/frida
🚀 #radare2 - 5.9.6 - codename "corteza" is out!
More than 300 changes in 2 months! Read more about the changes in this release: github.com/radareorg/radare2…