╔═══════════════════════════════════════════════════════════════════════════════╗
║ ║
║ █████╗ ██╗ ██╗████████╗ ██████╗ ███████╗██████╗ ██╗██████╗ █████╗ ║
║ ██╔══██╗██║ ██║╚══██╔══╝██╔═══██╗ ██╔════╝██╔══██╗██║██╔══██╗██╔══██╗ ║
║ ███████║██║ ██║ ██║ ██║ ██║ █████╗ ██████╔╝██║██║ ██║███████║ ║
║ ██╔══██║██║ ██║ ██║ ██║ ██║ ██╔══╝ ██╔══██╗██║██║ ██║██╔══██║ ║
║ ██║ ██║╚██████╔╝ ██║ ╚██████╔╝ ██║ ██║ ██║██║██████╔╝██║ ██║ ║
║ ╚═╝ ╚═╝ ╚═════╝ ╚═╝ ╚═════╝ ╚═╝ ╚═╝ ╚═╝╚═╝╚═════╝ ╚═╝ ╚═╝ ║
║ ║
╚═══════════════════════════════════════════════════════════════════════════════╝
Auto Frida is a powerful, all-in-one automation toolkit that handles everything from Frida installation to script injection. Zero manual setup required – just connect your device and start testing.
Features • Installation • Usage • Scripts • CodeShare • Author
|
Automatically installs Frida tools on Windows and deploys matching Frida server to your Android device. Detects device architecture (ARM64/ARM/x86) automatically. Universal SSL/TLS certificate pinning bypass for intercepting HTTPS traffic. Works with most Android applications out of the box. Bypass root detection mechanisms used by banking apps and security-sensitive applications including SafetyNet and RootBeer. |
Specialized script for bypassing SSL pinning in Flutter/Dart applications using libflutter.so hooks. Run scripts directly from Frida CodeShare using native Load and execute your own Frida scripts with full spawn/attach mode support. |
| Feature | Description |
|---|---|
| 3-Layer Validation | Robust Frida server management with process, port (27042), and protocol validation |
| PID-based Attach | Reliable attachment using process ID instead of package name |
| Smart Lifecycle | Idempotent server management - only starts/restarts when needed |
| SELinux Handling | Automatic SELinux permissive mode for rooted devices |
| Interactive Navigation | Go back & exit options available in all phases |
|
|
# Clone the repository
git clone https://github.com/ommirkute/Auto-Frida.git
# Navigate to directory
cd Auto-Frida
# Run Auto Frida
python auto_frida.py💡 Note: Auto Frida will automatically install
fridaandfrida-toolsvia pip if not already installed.
# 1. Connect your Android device via USB
# 2. Enable USB Debugging on your device
# 3. Run Auto Frida
python auto_frida.py
# That's it! Auto Frida handles everything:
# ✓ Installs Frida on Windows
# ✓ Detects device architecture
# ✓ Downloads matching Frida server
# ✓ Pushes and starts server on device
# ✓ Lists all installed apps
# ✓ Injects your chosen script┌─────────────────────────────────────────────────────────────────────────────┐
│ PHASE 1 │ Environment Validation │
│ │ └── Checks Python, pip, Frida. Auto-installs if needed │
├────────────┼────────────────────────────────────────────────────────────────┤
│ PHASE 2 │ Device Detection │
│ │ └── Finds devices, handles auth, detects architecture │
├────────────┼────────────────────────────────────────────────────────────────┤
│ PHASE 3 │ Device Analysis │
│ │ └── Checks root access, SELinux status, attempts permissive │
├────────────┼────────────────────────────────────────────────────────────────┤
│ PHASE 4 │ Smart Frida Server Lifecycle │
│ │ └── Downloads, pushes, starts with 3-layer validation │
├────────────┼────────────────────────────────────────────────────────────────┤
│ PHASE 5 │ App Enumeration │
│ │ └── Lists installed apps with PID status │
├────────────┼────────────────────────────────────────────────────────────────┤
│ PHASE 6 │ Target Selection │
│ │ └── Filter all/running apps, select target with back option │
├────────────┼────────────────────────────────────────────────────────────────┤
│ PHASE 7 │ Script Selection │
│ │ └── Built-in scripts, CodeShare, or custom local scripts │
├────────────┼────────────────────────────────────────────────────────────────┤
│ PHASE 8 │ Script Execution │
│ │ └── Spawn or Attach mode with full error handling │
└────────────┴────────────────────────────────────────────────────────────────┘
| Script | Description | Use Case |
|---|---|---|
🔓 ssl_pinning_bypass.js |
Universal SSL/TLS certificate pinning bypass | Intercept HTTPS traffic |
🛡️ root_bypass.js |
Root detection bypass for sensitive apps | Banking, payment apps |
🦋 flutter_ssl_bypass.js |
Specialized bypass for Flutter/Dart apps | Flutter-based apps |
🔍 anti_debug_bypass.js |
Anti-debugging and emulator detection bypass | Protected apps |
Place your custom .js files in the scripts/ directory:
Auto-Frida/
├── auto_frida.py
├── scripts/
│ ├── ssl_pinning_bypass.js
│ ├── root_bypass.js
│ ├── flutter_ssl_bypass.js
│ ├── anti_debug_bypass.js
│ └── your_custom_script.js ← Add here
└── logs/
Or select "C. Custom script options" during runtime to enter a path to any .js file.
Auto Frida supports running scripts directly from Frida CodeShare using the native --codeshare flag!
- Select "C. Custom script options" in Script Selection
- Choose "1. Frida CodeShare"
- Enter the script name in format:
author/script-name
| Script | Description |
|---|---|
pcipolloni/universal-android-ssl-pinning-bypass-with-frida |
Universal SSL Pinning Bypass |
dzonerzy/fridantiroot |
Root Detection Bypass |
akabe1/frida-multiple-unpinning |
Multiple SSL Unpinning |
masbog/frida-android-unpinning-ssl |
Android SSL Unpinning |
sowdust/universal-android-ssl-pinning-bypass-2 |
Universal SSL Bypass v2 |
# When prompted for CodeShare script name:
> pcipolloni/universal-android-ssl-pinning-bypass-with-frida
# Auto Frida builds the command:
frida -U --codeshare pcipolloni/universal-android-ssl-pinning-bypass-with-frida -f com.target.app|
Recommended for rooted devices
frida -U -f com.app.package -l script.js |
Works on non-rooted devices
frida -U -p <PID> -l script.js |
❌ "Device unauthorized" error
Accept the RSA key fingerprint prompt on your Android device. If no prompt appears:
- Revoke USB debugging authorizations in Developer Options
- Disconnect and reconnect USB cable
- Run
adb kill-server && adb devices
❌ "need Gadget to attach" error
This occurs when trying to Spawn on a non-rooted device:
- Use Attach mode instead of Spawn
- Root your device with Magisk
- Ensure Frida server runs as root:
su -c /data/local/tmp/fridaserver -D
❌ Frida server crashes or doesn't respond
SELinux may be blocking Frida:
adb shell su -c setenforce 0Or use Magisk's SELinux permissive mode setting.
❌ Version mismatch between Frida client and server
- Delete local
frida-server-*files - Remove server from device:
adb shell rm /data/local/tmp/fridaserver - Run Auto Frida again to re-download matching version
❌ "Unable to find process" error
The app may have crashed or closed:
- Manually start the app on device
- Use Attach mode instead of Spawn
- Check if the package name is correct
This project is licensed under the MIT License - see the LICENSE file for details.
⚠️ This tool is for authorized security testing only.Unauthorized use against systems you don't own or have explicit permission to test is illegal. The author is not responsible for any misuse of this tool. Always obtain proper authorization before testing any application.