# Frida > Dynamic instrumentation toolkit — hook and trace running processes, intercept function calls in real time **Category:** [[categories/dynamically-reverse-engineer-code-general|Dynamically Reverse-Engineer Code > General]] | **Tier:** Rich (FOR610) **Docs:** [https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/general](https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/general) ## Usage ```bash frida -l hook.js frida-trace -i 'recv*' frida-ps -U ``` ## Workflows - [[workflows/android-analysis-workflow|Android Malware Analysis]] — Step 6: Dynamic Instrumentation ## Related Tools - [[tools/radare2|radare2]] — Open-source reverse engineering command-line framework - [[tools/wine|Wine]] — Windows compatibility layer — run Windows executables on Lin #dynamic #instrumentation #hooking #tracing