Skip to content

Auto Frida is a powerful, all-in-one automation toolkit that handles everything from Frida installation to script injection. Zero manual setup required – just connect your device and start testing.

Notifications You must be signed in to change notification settings

CrackerCat/Auto-Frida

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

╔═══════════════════════════════════════════════════════════════════════════════╗
║                                                                               ║
║     █████╗ ██╗   ██╗████████╗ ██████╗     ███████╗██████╗ ██╗██████╗  █████╗  ║
║    ██╔══██╗██║   ██║╚══██╔══╝██╔═══██╗    ██╔════╝██╔══██╗██║██╔══██╗██╔══██╗ ║
║    ███████║██║   ██║   ██║   ██║   ██║    █████╗  ██████╔╝██║██║  ██║███████║ ║
║    ██╔══██║██║   ██║   ██║   ██║   ██║    ██╔══╝  ██╔══██╗██║██║  ██║██╔══██║ ║
║    ██║  ██║╚██████╔╝   ██║   ╚██████╔╝    ██║     ██║  ██║██║██████╔╝██║  ██║ ║
║    ╚═╝  ╚═╝ ╚═════╝    ╚═╝    ╚═════╝     ╚═╝     ╚═╝  ╚═╝╚═╝╚═════╝ ╚═╝  ╚═╝ ║
║                                                                               ║
╚═══════════════════════════════════════════════════════════════════════════════╝

🚀 Auto Frida v1.0 by Omkar Mirkute

Complete Android Security Testing Automation for Windows

Python Platform Frida License


Auto Frida is a powerful, all-in-one automation toolkit that handles everything from Frida installation to script injection. Zero manual setup required – just connect your device and start testing.

FeaturesInstallationUsageScriptsCodeShareAuthor


⚡ Key Features

🔧 Auto Installation

Automatically installs Frida tools on Windows and deploys matching Frida server to your Android device. Detects device architecture (ARM64/ARM/x86) automatically.

🔓 SSL Pinning Bypass

Universal SSL/TLS certificate pinning bypass for intercepting HTTPS traffic. Works with most Android applications out of the box.

🛡️ Root Detection Bypass

Bypass root detection mechanisms used by banking apps and security-sensitive applications including SafetyNet and RootBeer.

🦋 Flutter SSL Bypass

Specialized script for bypassing SSL pinning in Flutter/Dart applications using libflutter.so hooks.

🌐 Frida CodeShare

Run scripts directly from Frida CodeShare using native --codeshare flag. No download required!

📜 Custom Scripts

Load and execute your own Frida scripts with full spawn/attach mode support.

🎯 Additional Features

Feature Description
3-Layer Validation Robust Frida server management with process, port (27042), and protocol validation
PID-based Attach Reliable attachment using process ID instead of package name
Smart Lifecycle Idempotent server management - only starts/restarts when needed
SELinux Handling Automatic SELinux permissive mode for rooted devices
Interactive Navigation Go back & exit options available in all phases

📋 Requirements

💻 Windows Host

  • ✅ Python 3.8 or higher
  • ✅ pip package manager
  • ✅ ADB (Android Debug Bridge)
  • ✅ Internet connection (for downloads)

📱 Android Device

  • ✅ USB Debugging enabled
  • ✅ Rooted device (for Spawn mode)
  • ℹ️ Non-rooted works with Attach mode
  • ✅ ARM64 / ARM / x86 / x86_64 CPU

🚀 Installation

# Clone the repository
git clone https://github.com/ommirkute/Auto-Frida.git

# Navigate to directory
cd Auto-Frida

# Run Auto Frida
python auto_frida.py

💡 Note: Auto Frida will automatically install frida and frida-tools via pip if not already installed.


⚡ Quick Start

# 1. Connect your Android device via USB
# 2. Enable USB Debugging on your device
# 3. Run Auto Frida

python auto_frida.py

# That's it! Auto Frida handles everything:
#   ✓ Installs Frida on Windows
#   ✓ Detects device architecture
#   ✓ Downloads matching Frida server
#   ✓ Pushes and starts server on device
#   ✓ Lists all installed apps
#   ✓ Injects your chosen script

🔄 How It Works

┌─────────────────────────────────────────────────────────────────────────────┐
│  PHASE 1   │  Environment Validation                                        │
│            │  └── Checks Python, pip, Frida. Auto-installs if needed        │
├────────────┼────────────────────────────────────────────────────────────────┤
│  PHASE 2   │  Device Detection                                              │
│            │  └── Finds devices, handles auth, detects architecture         │
├────────────┼────────────────────────────────────────────────────────────────┤
│  PHASE 3   │  Device Analysis                                               │
│            │  └── Checks root access, SELinux status, attempts permissive   │
├────────────┼────────────────────────────────────────────────────────────────┤
│  PHASE 4   │  Smart Frida Server Lifecycle                                  │
│            │  └── Downloads, pushes, starts with 3-layer validation         │
├────────────┼────────────────────────────────────────────────────────────────┤
│  PHASE 5   │  App Enumeration                                               │
│            │  └── Lists installed apps with PID status                      │
├────────────┼────────────────────────────────────────────────────────────────┤
│  PHASE 6   │  Target Selection                                              │
│            │  └── Filter all/running apps, select target with back option   │
├────────────┼────────────────────────────────────────────────────────────────┤
│  PHASE 7   │  Script Selection                                              │
│            │  └── Built-in scripts, CodeShare, or custom local scripts      │
├────────────┼────────────────────────────────────────────────────────────────┤
│  PHASE 8   │  Script Execution                                              │
│            │  └── Spawn or Attach mode with full error handling             │
└────────────┴────────────────────────────────────────────────────────────────┘

📜 Built-in Scripts

Script Description Use Case
🔓 ssl_pinning_bypass.js Universal SSL/TLS certificate pinning bypass Intercept HTTPS traffic
🛡️ root_bypass.js Root detection bypass for sensitive apps Banking, payment apps
🦋 flutter_ssl_bypass.js Specialized bypass for Flutter/Dart apps Flutter-based apps
🔍 anti_debug_bypass.js Anti-debugging and emulator detection bypass Protected apps

Adding Custom Scripts

Place your custom .js files in the scripts/ directory:

Auto-Frida/
├── auto_frida.py
├── scripts/
│   ├── ssl_pinning_bypass.js
│   ├── root_bypass.js
│   ├── flutter_ssl_bypass.js
│   ├── anti_debug_bypass.js
│   └── your_custom_script.js  ← Add here
└── logs/

Or select "C. Custom script options" during runtime to enter a path to any .js file.


🌐 Frida CodeShare Integration

Auto Frida supports running scripts directly from Frida CodeShare using the native --codeshare flag!

How to Use

  1. Select "C. Custom script options" in Script Selection
  2. Choose "1. Frida CodeShare"
  3. Enter the script name in format: author/script-name

Popular CodeShare Scripts

Script Description
pcipolloni/universal-android-ssl-pinning-bypass-with-frida Universal SSL Pinning Bypass
dzonerzy/fridantiroot Root Detection Bypass
akabe1/frida-multiple-unpinning Multiple SSL Unpinning
masbog/frida-android-unpinning-ssl Android SSL Unpinning
sowdust/universal-android-ssl-pinning-bypass-2 Universal SSL Bypass v2

Example

# When prompted for CodeShare script name:
> pcipolloni/universal-android-ssl-pinning-bypass-with-frida

# Auto Frida builds the command:
frida -U --codeshare pcipolloni/universal-android-ssl-pinning-bypass-with-frida -f com.target.app

🎯 Execution Modes

🚀 Spawn Mode

Recommended for rooted devices

  • Launches app fresh with Frida attached from start
  • Captures all initialization code
  • Automatically kills existing app instance
  • Requires rooted device
frida -U -f com.app.package -l script.js

🔗 Attach Mode

Works on non-rooted devices

  • Connects to already running app using PID
  • Reliable PID-based targeting
  • May miss initialization code
  • Works on non-rooted devices
frida -U -p <PID> -l script.js

🔧 Troubleshooting

❌ "Device unauthorized" error

Accept the RSA key fingerprint prompt on your Android device. If no prompt appears:

  1. Revoke USB debugging authorizations in Developer Options
  2. Disconnect and reconnect USB cable
  3. Run adb kill-server && adb devices
❌ "need Gadget to attach" error

This occurs when trying to Spawn on a non-rooted device:

  • Use Attach mode instead of Spawn
  • Root your device with Magisk
  • Ensure Frida server runs as root: su -c /data/local/tmp/fridaserver -D
❌ Frida server crashes or doesn't respond

SELinux may be blocking Frida:

adb shell su -c setenforce 0

Or use Magisk's SELinux permissive mode setting.

❌ Version mismatch between Frida client and server
  1. Delete local frida-server-* files
  2. Remove server from device: adb shell rm /data/local/tmp/fridaserver
  3. Run Auto Frida again to re-download matching version
❌ "Unable to find process" error

The app may have crashed or closed:

  1. Manually start the app on device
  2. Use Attach mode instead of Spawn
  3. Check if the package name is correct

👨‍💻 Author

Security Researcher & Developer

GitHub LinkedIn


📄 License

This project is licensed under the MIT License - see the LICENSE file for details.


⚠️ Disclaimer

⚠️ This tool is for authorized security testing only.

Unauthorized use against systems you don't own or have explicit permission to test is illegal. The author is not responsible for any misuse of this tool. Always obtain proper authorization before testing any application.


⭐ Found this useful? Give it a star!

Made with ❤️ by Omkar Mirkute

Auto Frida v1.0 • 2026

Star

About

Auto Frida is a powerful, all-in-one automation toolkit that handles everything from Frida installation to script injection. Zero manual setup required – just connect your device and start testing.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 84.9%
  • JavaScript 15.1%