A full-featured, multi-architecture debugger built on PyQt5 and Frida for reverse engineering and security analysis.
Dwarf is a full-featured, multi-architecture debugger built on PyQt5 and Frida. It provides a graphical interface for dynamic analysis and debugging of applications across Android, iOS, and local binaries, primarily targeting reverse engineering and security analysis tasks.
Reverse engineers, security analysts, and software crackers who need a versatile debugging tool for dynamic analysis across multiple platforms.
Developers choose Dwarf for its seamless integration with Frida, cross-platform support, and graphical interface that simplifies complex debugging and instrumentation workflows.
Full featured multi arch/os debugger built on top of PyQt5 and frida
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Supports Android, iOS, and local binaries on various architectures, as shown in usage commands like 'dwarf -t android com.facebook.katana' and 'dwarf -t local /usr/bin/cat'.
Leverages Frida for dynamic instrumentation and scripting, enabling powerful tracing and injection, exemplified by dwarf-trace for function calls and custom agent injection.
Built with PyQt5, providing an interactive UI that simplifies attaching to processes and debugging, making complex tasks more accessible than command-line alternatives.
Offers typings and autocompletion for Frida and Dwarf API, enhancing scripting efficiency in IDEs like IntelliJ or VSCode, as demonstrated by dwarf-creator setup.
The README admits known issues like JavaTraceView being distorted and showing weakref/handle instead of values, which can hinder accurate debugging sessions.
Project description includes 'some terrible code,' indicating potential reliability and maintainability concerns that might affect long-term use.
Heavy reliance on Frida restricts use in environments where Frida is unsupported or where alternative instrumentation frameworks are preferred, adding vendor lock-in.