Flutter-Proxy-Unlocker is a Frida-based toolkit for intercepting and redirecting network traffic from Flutter applications on Android and iOS. It dynamically discovers and hooks internal Flutter engine functions to bypass SSL/TLS certificate validation and transparently reroute socket connections to a Burp Suite proxy. It supports arm64 and x86_64 architectures and works without repackaging, intended only for authorized mobile security testing.
frida-ps -UaiAttach to a running process
frida -Uf com.example.myapp -l FlutterProxy.jsfrida-ps -UaiAttach to a running process
frida -Uf com.example.myapp -l FlutterProxy.jsOpen Burp Suite and enable the Proxy listener.
- Go to Proxy → Options → Proxy Listeners
- Ensure your listener is active (IP
192.168.x.x, Port8080) - Tick the checkbox: "Support invisible proxying"
- This is required because Flutter sockets are raw TCP, not browser-style HTTP
Make sure your device and host machine are on the same network.
At the very end of FlutterProxy.js, configure your proxy:
BURP_PROXY_IP = "192.168.x.x"; // your host machine IP
BURP_PROXY_PORT = 8080; // your Burp proxy port
Run this command in CMD/Terminal:
frida -Uf <package_name> -l FlutterProxy.js