execute
Inject Frida JavaScript scripts into Android applications to analyze runtime behavior, retrieve execution data, and perform dynamic reverse engineering tasks.
Instructions
Inject a Frida JavaScript script into the frontmost application. The script is automatically wrapped with try-catch for safety. Returns immediately after injection - use get_messages() to retrieve results after the user has triggered the target functionality.
Args: script: Frida JavaScript code to inject. Use send() to return data. script_file: Path to a .js file to inject. Use this for large scripts instead of script parameter.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| script | No | ||
| script_file | No |