A comprehensive GUI and API for automating Frida-related tasks for Android application analysis and security testing.
- Device management and connection status
- Automatic Frida server download and installation
- Application listing and filtering
- Frida script injection
- SSL pinning bypass capabilities
- Simple script management
- Python 3.8+
- Android device or emulator with ADB connection
- Rooted device (for direct Frida injection)
- Clone this repository:
git clone https://github.com/atiilla/fridify.git
cd fridify- Install required Python packages:
python -m venv venv
windows: source venv/Scripts/activate || venv\Scripts\activate
linux: source venv/bin/activate
pip install -r requirements.txt- Connect your Android device or emulator:
adb devicespython app.pyThis will start the FastAPI server on http://localhost:8000
streamlit run web.pyThis will start the Streamlit web interface on http://localhost:8501
The Streamlit web interface provides a user-friendly way to:
- Device Status: Check device connection, architecture, and running processes
- Frida Server: Start, download, and manage Frida server on your device
- Applications: List and filter installed applications
- Script Injection: Inject Frida scripts into applications
- Scripts: Manage and upload custom Frida scripts
To bypass SSL pinning:
- Make sure Frida server is running on your device (use the "Frida Server" page)
- Go to "Script Injection" page
- Select the target application
- Choose the "ssl_pinning_bypass.js" script
- Click "Inject Script"
If your device is not rooted, you have these alternatives:
-
Objection:
pip install objection objection --gadget <package_name> explore android sslpinning disable
-
Repackage the app:
objection patchapk -s <path-to-apk>
-
Use a rooted emulator like Genymotion or modified AVD
Custom scripts should be placed in the scripts directory. The format should be:
// Description: Your script description here
Java.perform(function() {
console.log("Script loaded");
// Your code here
});API documentation is available at:
- OpenAPI documentation: http://localhost:8000/docs
- Custom documentation: http://localhost:8000/docs/custom
MIT
This tool is provided for educational and research purposes only. The authors are not responsible for any misuse or damage caused by this tool. Always ensure you have proper authorization before testing or analyzing any application. Use of this tool against applications or systems without explicit permission from their owners may be illegal and is not recommended.