A web-based graphical interface for Frida dynamic instrumentation toolkit, designed for Android reverse engineering and security research.
- Dashboard: Monitor Frida server status, manage ADB devices, and browse running processes
- Script Library: Built-in collection of common Frida scripts for SSL pinning bypass, root detection, and more
- Script Editor: Load and inject custom Frida scripts with real-time console output
- Android Screen Viewer: Real-time screen streaming with touch/swipe input and device control
- Process Management: Spawn, attach, and inject scripts into Android applications
- Python 3.7+
- ADB (Android Debug Bridge)
- Frida and frida-tools
- Rooted Android device with Frida server installed
- Start the Flask server:
python app.py- Open your browser and navigate to:
http://localhost:8010
-
Configure Frida server path in the dashboard settings
-
Start the Frida server from the GUI or manually via ADB
-
Select a target process and inject scripts
- Frida Server Path: Set the path where Frida server is installed on your device (default:
/data/local/tmp/frida-server) - HTTP Proxy: Configure device proxy settings for intercepting network traffic
- Screen Streaming: Adjust FPS and quality settings for optimal performance
- Click: Tap on screen
- Drag: Swipe gesture
- Quick Actions: Home, Back, Volume, Power buttons
- Screenshot: Capture high-quality PNG
- Stream: Real-time screen mirroring at configurable FPS
Pre-built scripts include:
- SSL Pinning Bypass (multiple methods)
- Root Detection Bypass
- Emulator Detection Bypass
- Debug Detection Bypass
- Memory Dumping Utilities
Ensure the server is running:
adb shell "ps -A | grep frida"Check the binary name matches your configuration.
adb kill-server
adb start-server
adb devices- This tool is intended for security research and testing on devices you own
- Always obtain proper authorization before testing applications
- Use responsibly and ethically
MIT License
Contributions are welcome. Please open an issue or submit a pull request.
- Frida - Dynamic instrumentation toolkit
- Built with Flask, Socket.IO, and Tailwind CSS
- Architected and developed with Claude.ai (who also learned that Android's
pidofhas strong feelings about full paths)


