Skip to content
Cross-platform network reverse engineering framework written in Python 🌐
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.

FRida In The Middle

fritm is a minimalist, cross-platform (tested on macOS and Windows) network reverse engineering framework written in Python.

fritm-hook allows you to easily hook the connect() function with frida to redirect all traffic from a target application.

You can then use the builtin server written in Python to initiate a Man-in-the-middle attack.

Even if you don't want to use Python, you can use the fritm-hook command to redirect the traffic to your application and implement the simple lecture of the HTTP CONNECT header.


pip install fritm


Hook the process:

fritm-hook PROCESS_NAME_OR_PID -p PORT # (default 8080)

Or create a new one:

fritm-spawn PATH_TO_COMMAND -p PORT # (default 8080)

Launch a proxy server in Python:

import select

from fritm import start_proxy_server

def dumb_callback(soClient, soServer):
    """Forwards all the traffic between the two sockets
    conns = [soClient, soServer]
    other = {soClient: soServer, soServer: soClient}
    active = True
        while active:
            rlist, wlist, xlist =, [], conns)
            if xlist or not rlist:
            for r in rlist:
                data = r.recv(8192)
                if not data:
                    active = False
        for c in conns:

httpd = start_proxy_server(dumb_callback)

Now, all the traffic will go through your application. You can modify anything on the fly.

How does it work?

Hooking with fritm.hook(process, port)

  1. attach to the target process
  2. intercept the calls to connect()
  3. replace the target IP address by and the port with the chosen one
  4. execute the connect() function with the local IP
  5. just before returning, send the HTTP CONNECT method with the original IP and port

fritm.spawn_and_hook(process, port) launches the process and ensures it is hooked from the beginning.

MITM with fritm.start_proxy_server(callback, port)

  1. Launch a local server that listens for connections on the given port
  2. Upon receiving a new connection from the hooked client, read the IP and port of the server from the HTTP CONNECT header
  3. Open a new socket to the server
  4. Call callback(socket_to_client, socket_to_server)

Differences with mitmproxy

  • mitmproxy doesn't use function hooking, it intercepts all the traffic from your browser or computer
  • mitmproxy only works for HTTP traffic, whereas fritm works with any TCP traffic.

Differences with proxychains / proxychains-ng

  • fritm-spawn is intented as simplified and cross-platform version of proxychains.
  • fritm-hook can attach to an already running process.
  • proxychains is not cross-platform and hard to install, whereas fritm is cross-platform and simple to install.
  • proxychains uses a config file whereas fritm-spawn only takes two arguments
  • fritm includes a HTTP proxy server (that is also able to communicate with proxychains)
  • proxychains can handle a lot of different proxy types (SOCKS4, SOCKS5, HTTPS) with a lot of options (e.g. for authentification)
  • proxychains can chain multiple proxies
  • proxychains handles any proxy address whereas fritm-spawn defaults to localhost. However, if anyone needs it for remote addresses, post an issue and I'll implement it.

Current limitations

  • Some Windows user faced issues that I couldn't reproduce
  • fritm will fail on IPv6 addresses, but it should not be hard to fix (I just don't happen to have any application that uses an IPv6 address to test).
You can’t perform that action at this time.