README.md
AI-assisted mobile security testing by exposing Frida functionality.
An MCP server that enables AI-assisted mobile security testing by exposing Frida functionality for Android application research. It provides tools for hooking Java methods, manipulating memory, managing device processes, and executing custom Frida scripts.
Tools (4)
hook_java_methodHooks a specific Java method in an Android application to intercept calls.manipulate_memoryReads or writes to the memory of a running process.manage_processesLists, attaches to, or spawns processes on the target device.execute_frida_scriptExecutes a custom Frida script on the target application.Configuration
claude_desktop_config.json
{
"mcpServers": {
"frida-mcp": {
"command": "npx",
"args": ["-y", "@cbxss/frida-mcp"]
}
}
}Try it
→List all running processes on the connected Android device.
→Hook the 'checkPassword' method in the 'com.example.app.LoginActivity' class to see what arguments are being passed.
→Execute a Frida script to bypass SSL pinning in the target application.
→Find the memory address for the user session token and read 32 bytes from it.
→Spawn the 'com.android.settings' application and attach a debugger script.