Powerful web-based toolkit for Android & iOS penetration testing and mobile security analysis
v2.0.0 Android & iOS AI-Powered Open Source
Frida Script Runner is a comprehensive web-based toolkit designed to simplify mobile application security analysis and penetration testing for both Android and iOS platforms. It provides a user-friendly interface through Flask to enhance the efficiency of security testing tasks.
This tool simplifies the process of interacting with Frida, a dynamic instrumentation toolkit. It features AI-powered script generation through Codex CLI integration with MCP (Model Context Protocol) servers for advanced binary analysis, making it easier than ever to analyze, manipulate, and interact with mobile applications.
Execute custom Frida scripts on Android and iOS applications with real-time output monitoring.
Generate Frida scripts automatically using AI with advanced prompt engineering and binary analysis.
Dump APK (Android) and IPA (iOS) files directly from connected devices.
Detect SSL pinning, bypass root/jailbreak detection, and analyze app security.
Execute custom Frida scripts on selected mobile applications to analyze and manipulate their behavior. Support for both Android and iOS platforms with real-time script execution monitoring.
View real-time output generated by the Frida process, allowing instant feedback on script execution. Monitor logs, errors, and script results as they happen.
Organize Frida scripts into different directories for efficient management and easy selection. Separate directories for Android and iOS scripts.
Easily create and run custom Frida scripts by copy-pasting the script code directly into the tool. No need to save files - just paste and run.
Generate Frida scripts automatically using natural language prompts. The AI system uses Codex CLI with MCP (Model Context Protocol) servers for real-time binary analysis and reverse engineering.
Generate Frida scripts using the Codex CLI with advanced prompt engineering. The system understands your requirements and generates optimized scripts automatically.
Access Ghidra and JADX MCP servers for real-time binary analysis and reverse engineering. Get accurate function names, addresses, and binary structure information.
AI-generated scripts use only compatible functions from the official Frida JavaScript API. Ensures scripts work correctly with your Frida version.
Scripts are specifically optimized for ARM Android devices with proper stability patterns. Includes ARM-specific error handling and memory management.
Test and refine your prompts with the built-in Codex Bridge web interface.
Accessible at http://localhost:8091 when the bridge is running.
Extract APK (Android) or IPA (iOS) files from connected devices by selecting installed packages. Supports both regular and split APKs.
Quickly find target applications via live search functionality in the package selector. Real-time filtering as you type.
Define a custom name for the dumped APK/IPA instead of using the default package name. Makes organization easier for multiple versions.
Upload and install an APK file directly onto an Android device with a single click. Progress tracking and status updates included.
Manage Frida server installation and execution directly from the web interface. Start, stop, and monitor Frida server status for connected devices.
Inject Frida Gadget into APK files for runtime instrumentation without root/jailbreak. Manage gadget versions and architectures.
Detect SSL pinning implementations in Android APKs. Analyze uploaded APKs or installed packages to identify SSL pinning mechanisms.
Configure Android device HTTP proxy settings via ADB. Set or clear global HTTP proxy for network traffic interception.
Search and import Frida scripts from the Frida Codeshare repository. Access thousands of community-contributed scripts.
Graphical interface for ADB commands. Execute common ADB operations through a user-friendly web interface.
The tool includes an extensive library of pre-built Frida scripts for common security testing scenarios:
# Clone the repository
git clone https://github.com/z3n70/Frida-Script-Runner.git
cd Frida-Script-Runner
# Install dependencies
pip3 install -r requirements.txt
# Run the application
python3.11 frida_script.py
# Access the web interface
# http://127.0.0.1:5000
# Build and run with Docker Compose
docker-compose up --build
# Start Codex Bridge (for AI features)
# On host machine (Windows/Linux/macOS)
python codex-bridge.py
# Access the applications
# Frida Script Runner: http://localhost:5000
# Codex Bridge Tester: http://localhost:8091
If you want to use AI-powered script generation:
codex-bridge.py if needed.config.toml.example to .config.toml and adjust MCP server pathshttp://127.0.0.1:5000scripts/Script Directory 1/scripts/Script Directory 2/static/data/script.json for structure and naming conventions"Intercept SSL pinning bypass for Android app""Hook Java method com.example.App.authenticate and modify return value""Monitor file operations and log file paths""Hook the main function and log all parameters""Bypass root detection in RootBeer library""Hook native function strcmp in libc.so"AI can access Ghidra/JADX data for accurate function names and addresses, making script generation more precise.
Scripts automatically include ARM stability patterns and error handling for better reliability.
MCP servers provide live binary analysis during script generation, ensuring up-to-date information.
┌─────────────────────┐ ┌─────────────────────┐ ┌─────────────────────┐
│ Web Interface │ │ Codex Bridge │ │ MCP Servers │
│ (Flask App) │◄───┤ (AI Integration) │◄───┤ (Binary Analysis) │
│ │ │ │ │ │
│ • Script Runner │ │ • Codex CLI Proxy │ │ • Ghidra Server │
│ • Package Manager │ │ • Prompt Engineering│ │ • JADX Server │
│ • Real-time Output │ │ • MCP Client │ │ • Function Analysis │
└─────────────────────┘ └─────────────────────┘ └─────────────────────┘
│
▼
┌─────────────────────┐ ┌─────────────────────┐
│ Frida Runtime │ │ Mobile Device │
│ │◄───┤ │
│ • Script Execution │ │ • Android (rooted) │
│ • Instrumentation │ │ • iOS (jailbroken) │
│ • Memory Analysis │ │ • Running Apps │
└─────────────────────┘ └─────────────────────┘
The architecture consists of four main components:
Contributions are welcome! Here's how you can help:
Contact the maintainer: @zenalarifin_
This project is licensed under the MIT License - see the LICENSE file for details.