TestTarget32 is a tiny .NET Framework 4.8 x86 console program meant to be an easy target for:
- native API tracing hooks (e.g.
MessageBoxW,CreateFileW) - managed method resolution/tracing via
ManagedHookHostProj+ FridaInterceptor.attach()
This is intentionally not “realistic”; it exists so you can validate your build + injection pipeline quickly.
Open:
examples\\TestTarget32\\TestTarget32.sln
Build:
Release | x86
Or from a Developer Command Prompt:
msbuild examples\\TestTarget32\\TestTarget32.sln /p:Configuration=Release /p:Platform=x86Start the EXE and note the PID printed on startup.
Then use the keyboard menu:
M-> callsMessageBoxWF-> writes a temp file (File.WriteAllText), typically triggersCreateFileWP-> calls managedPotatoVerifier.CheckIsPotato(string)O-> calls managed overloadPotatoVerifier.CheckIsPotato(string,int)
Use InjectorCli to attach or spawn.
Native hooks:
examples\\InjectorCli\\hooks\\trace_messagebox.jsexamples\\InjectorCli\\hooks\\hook_createfilew.jsexamples\\InjectorCli\\hooks\\change_messagebox_text.js
Managed tracing:
examples\\ManagedHookHostProj\\agent\\resolve_and_trace_managed.js
Update that agent script with:
targetAssemblyPath-> path toTestTarget32.exetargetTypeName->TestTarget32.PotatoVerifiertargetMethodName->CheckIsPotatoparamSig->System.String(orSystem.String|System.Int32for the overload)