Skip to content

A set of scripts to facilitate HTTP interception on mobile apps

License

Notifications You must be signed in to change notification settings

y0k4i-1337/frida4burp

Repository files navigation

Frida4burp

 

Frida4burp

Github top language Github language count Repository size License


About   |   Features   |   Technologies   |   Requirements   |   Starting   |   Disclaimer   |   License   |   Author


🎯 About

A set of scripts to facilitate HTTP interception on mobile apps using Frida and Burp.

✨ Features

✔️ Update third-party scripts;
✔️ Generate Burp CA certificate in proper format to be used by scripts;
✔️ Bypass SSL unpinning;
✔️ Bypass anti-root;
✔️ Any other script compatible with Frida.

🚀 Technologies

The following tools were used in this project:

✅ Requirements

Before starting 🏁, you need to have Burp and Frida installed and properly configured.

🏁 Starting

# Clone this project
$ git clone https://github.com/y0k4i-1337/frida4burp

# Access
$ cd frida4burp

# Open Burp and run the script to get your certificate in PEM format
$ ./getburpcert.sh

# Copy the content of ./certs/cacert.pem into the marked location at `config.js`

# Update `config.js` according to your needs

# Use Frida to launch the app you're interested in with the scripts injected (starting with config.js). Which scripts to use is up to you, but for Android a good command to start with is:
$ frida -U \
    -l ./config.js \
    -l ./android/android-antiroot.js \
    -l ./android/fridantiroot.js \
    -l ./native-connect-hook.js \
    -l ./native-tls-hook.js \
    -l ./android/android-proxy-override.js \
    -l ./android/android-system-certificate-injection.js \
    -l ./android/frida-multiple-unpinning.js \
    -l ./android/android-certificate-unpinning.js \
    -l ./android/android-certificate-unpinning-fallback.js \
    -f $PACKAGE_ID

# You can, optionally, build all the scripts into a single one for convenience
$ ./build.sh

# In this case, you just need to run:
$ frida -U -l ./build/android-frida-single-script.js -f $PACKAGE_ID

⛄ Disclaimer

This repository is basically a collection of third-party scripts that I found useful for instrumenting mobile applications, specially for intercepting HTTP requests in Burp. Almost all the scripts stored here were simply copied from @httptoolkit/frida-interception-and-unpinning.

For now, I have just added some custom scripts to make this process easier.

📝 License

This project is under license from GNU Affero. For more details, see the LICENSE file.

Made with ❤️ by y0k4i

 

Back to top

About

A set of scripts to facilitate HTTP interception on mobile apps

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published