clsdumper — Android Dynamic Class Dumper (dump all DEX files... #1868
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What it is:
clsdumperis an Android dynamic DEX/class dumping tool that uses Frida to hook a running (attach) or freshly started (spawn) app process and extract every DEX it can find using 9 complementary extraction strategies. It is designed for hard targets: anti-Frida protections, packed/encrypted DEX, and dynamical...🔧 Technical Details
Anti-instrumentation bypass via libc/libpthread hooks: To reduce anti-Frida detection, hook
sigaction/signalto block apps from registering signal handlers used for anti-debug/tamper reactions, intercept and sanitize/proc/self/mapsby serving a filtered version usingmemfd_create, and monitorpthread_createto identify/neutralize watchdog threads that periodically detect hooks/debuggers and kill the process.ART-native loaded-DEX discovery: When Java APIs are unreliable (or the Java bridge breaks), enumerate DEX already loaded by walking ART internals (
Runtime -> ClassLinker -> DexFile). This approach recovers DEX that exist only as runtime objects and may not be visible via standard Java-level enumeration.Hooking DEX introduction points: Capture DEX as it enters the runtime by hooking native load/creation paths such as 🤖 Agent Actions
Summary:
Tests:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.