About | Features | Technologies | Requirements | Starting | Disclaimer | License | Author
A set of scripts to facilitate HTTP interception on mobile apps using Frida and Burp.
✔️ Update third-party scripts;
✔️ Generate Burp CA certificate in proper format to be used by scripts;
✔️ Bypass SSL unpinning;
✔️ Bypass anti-root;
✔️ Any other script compatible with Frida.
The following tools were used in this project:
Before starting 🏁, you need to have Burp and Frida installed and properly configured.
# Clone this project
$ git clone https://github.com/y0k4i-1337/frida4burp
# Access
$ cd frida4burp
# Open Burp and run the script to get your certificate in PEM format
$ ./getburpcert.sh
# Copy the content of ./certs/cacert.pem into the marked location at `config.js`
# Update `config.js` according to your needs
# Use Frida to launch the app you're interested in with the scripts injected (starting with config.js). Which scripts to use is up to you, but for Android a good command to start with is:
$ frida -U \
-l ./config.js \
-l ./android/android-antiroot.js \
-l ./android/fridantiroot.js \
-l ./native-connect-hook.js \
-l ./native-tls-hook.js \
-l ./android/android-proxy-override.js \
-l ./android/android-system-certificate-injection.js \
-l ./android/frida-multiple-unpinning.js \
-l ./android/android-certificate-unpinning.js \
-l ./android/android-certificate-unpinning-fallback.js \
-f $PACKAGE_ID
# You can, optionally, build all the scripts into a single one for convenience
$ ./build.sh
# In this case, you just need to run:
$ frida -U -l ./build/android-frida-single-script.js -f $PACKAGE_ID
This repository is basically a collection of third-party scripts that I found useful for instrumenting mobile applications, specially for intercepting HTTP requests in Burp. Almost all the scripts stored here were simply copied from @httptoolkit/frida-interception-and-unpinning.
For now, I have just added some custom scripts to make this process easier.
This project is under license from GNU Affero. For more details, see the LICENSE file.
Made with ❤️ by y0k4i