Reverse Engineering- Frida for Beginners
- IT & Software
- Jan 31, 2025

Reverse Engineering: Frida for Beginners, available at $64.99, has an average rating of 4.5, with 44 lectures, based on 94 reviews, and has 7077 subscribers.
You will learn about Listing process libraries Reversing Android apps Hooking Classes and Functions Examining and modifying function parameters and return values Reversing windows app Hooking process functions Memory scanning Process injection Hacking memory Decompiling apps Bypassing root detection Intercepting http and https traffic Bypassing basic security mechanism for android and windows apps Enumerating libraries and imported functions and more. This course is ideal for individuals who are Reverse engineering and malware analysis students or Security researchers or Penetration testers It is particularly useful for Reverse engineering and malware analysis students or Security researchers or Penetration testers.
Enroll now: Reverse Engineering: Frida for Beginners
Summary
Title: Reverse Engineering: Frida for Beginners
Price: $64.99
Average Rating: 4.5
Number of Lectures: 44
Number of Published Lectures: 44
Number of Curriculum Items: 44
Number of Published Curriculum Objects: 44
Original Price: $59.99
Quality Status: approved
Status: Live
What You Will Learn
Who Should Attend
Target Audiences
Frida is a dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. It allows you to inject your own scripts into black box processes. Hook any function, spy on crypto APIs or trace private application code, no source code needed. Edit, hit save, and instantly see the results. All without compilation steps or program restarts. It’s the swiss army knife for process injections for native apps and is a popular dynamic code instrumentation toolkit. It lets you inject snippets of JavaScript or your own library into native apps on Windows and Android. It is the go-to tool you use for API tracing.
At the end of this course you will be able to:
-
learn how to reverse engineer and perform process injection into android and windows applications
-
hook functions and modify its behaviour
-
perform basic bypass of security restrictions on android and windows apps
Features of this course:
-
Designed with beginners in mind.
-
Simple android apps and windows crackme’s designed to learn process injection and function hooking
-
Practical and hands-on
-
Using free tools only
Suitable for:
Reverse Engineering and Malware Analysis Students
Students planning on entering Malware Analysis and Reverse Engineering, or Penetration Testers as a Career Path
Security researchers
Prerequisite:
Windows PC
Basic Java/Javascript would be helpful but not mandatory
Preferably have an Android phone (non-rooted)
Enroll now and I will see you inside!
Course Curriculum
Chapter 1: Introduction
Lecture 1: Intro to Frida
Lecture 2: Intro to Frida Injection
Chapter 2: Setting up lab and rooted android emulator
Lecture 1: Installing LD-player emulator
Lecture 2: Installing platform tools
Lecture 3: Installing frida-server on the android emulator
Lecture 4: Installing objection and frida tools on the pc
Lecture 5: Testing objection and frida
Chapter 3: Setting up lab for non-rooted android phone
Lecture 1: Installing Android-studio build-tools
Lecture 2: Installing the apktool
Lecture 3: Patching the target apk file with the frida-gadget (frida-server)
Lecture 4: Enabling developer-mode on the android phone
Lecture 5: Installing the patched-apk file to the android phone and testing it
Chapter 4: Decompiling apk files
Lecture 1: Reverse engineering using the apktool
Lecture 2: Installing dex2jar and jd-gui
Lecture 3: Decompiling an apk file using dex2jar and jd-gui
Chapter 5: Understanding the Frida CLI
Lecture 1: Understanding the Frida CLI
Chapter 6: Simple Frida hello-world script
Lecture 1: Simple Frida hello-world script
Chapter 7: Frida script to list classes
Lecture 1: Frida script to list classes
Chapter 8: Frida scripts to list methods and properties
Lecture 1: Frida scripts to list methods and properties
Chapter 9: Hooking functions and bypassing root detection
Lecture 1: Intro to hooking functions
Lecture 2: Decompiling apk to identify target function to hook
Lecture 3: Hooking functions and modifying them
Chapter 10: Dumping function parameters
Lecture 1: Dumping function parameters
Chapter 11: Re-using app functions in Frida scripts and decrypting passwords
Lecture 1: Analyzing app functions and creating skeleton script
Lecture 2: Implementing app functions in frida and decrypting password
Chapter 12: Frida and Windows: listing modules
Lecture 1: Listing windows modules (DLL libraries) using Frida
Chapter 13: Hooking windows MessageBox function
Lecture 1: Hooking windows MessageBox function
Chapter 14: Modifying the windows MessageBox API
Lecture 1: Modifying the windows MessageBox API
Chapter 15: Listing windows process functions
Lecture 1: Listing windows process functions
Chapter 16: Hooking file reading functions
Lecture 1: Hooking file reading functions
Chapter 17: Memory scanning and hacking
Lecture 1: Memory scanning and hacking
Chapter 18: Supplementary lessons – Android ethical hacking
Lecture 1: Additional lessons on android ethical hacking
Chapter 19: Intercepting http traffic
Lecture 1: Installing Burpsuite
Lecture 2: Setting Burpsuite proxy for LDplayer emulator
Lecture 3: Installing the Insecure Banking app
Chapter 20: Intercepting HTTPs traffic
Lecture 1: Installing burpsuite CA cert
Lecture 2: Modifying network-security-config
Lecture 3: Creating keystore signing and intercepting https
Chapter 21: Local data storage vulnerabilities
Lecture 1: Local data storage vulnerabilities
Chapter 22: Exported application component vulnerabilities
Lecture 1: Exported application component vulnerabilities
Chapter 23: Insecure logging vulnerability
Lecture 1: Insecure logging vulnerability
Chapter 24: Bypassing root detection using objection
Lecture 1: Bypassing root detection using objection
Lecture 2: Running Frida scripts after objection root bypass
Chapter 25: Resources for further study
Lecture 1: Bonus Lecture
Instructors

Paul Chin
College lecturer
Rating Distribution
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
- Random Picks
- Popular
- Hot Reviews
- Create a Live Video Chat Using Laravel, Reverb, WebRTC, JS
- Life Insurance Annuity Ultimate Buyer’s Guide
- Crypto Trading Mastery (Scalping, Day trading, price action)
- Company Valuation Financial Modeling
- How to Draw Cute Thanksgiving!
- PostgreSQL High Performance Tuning Guide
- Hydrogen Energy Masterclass- Fundamentals Applications
- Create 3D Models of Furniture and Books in Paint 3D
- 1YouTube Masterclass The Best Guide to YouTube Success
- 2Photoshop CC- Adjustement Layers, Blending Modes Masks
- 3Personal Finance
- 4SolidWorks Essential Training ( 2023 2024 )
- 5The Architecture of Oscar Niemeyer
- 6Advanced Photoshop Manipulations Tutorials Bundle
- 7Polymer Clay Jewelry Making Techniques for Beginners
- 8SEO for Web Developers
- 1Linux Performance Monitoring Analysis Hands On !!
- 2Content Writing Mastery 1- Content Writing For Beginners
- 3Media Training for PrintOnline Interviews-Get Great Quotes
- 4Learn Facebook Ads from Scratch Get more Leads and Sales
- 5The Complete Digital Marketing Course Learn From Scratch
- 6C#- Start programming with C# (for complete beginners)
- 7[FREE] How to code 10 times faster with Emmet
- 8Driving Results through Data Storytelling