Warning: This project is under active development and is not ready for production use.
Runtime mobile application instrumentation toolkit powered by Frida. Inspect, hook, and modify mobile apps through a web-based interface.
Now it supports both iOS and Android!
- Runtime Method Hooking - Intercept native and managed functions with structured logging
- Cryptographic API Interception - Monitor encryption/decryption operations with data capture
- Filesystem Browser - Navigate, upload, download, and inspect files with hex/text preview
- SQLite Database Inspection - Browse tables, run queries, and view results
- Syslog Streaming - Real-time system and agent log monitoring
- Process Crash Reporting - Exception handler with register dump and backtrace
- Flutter Support - Monitor platform method channel communication on both platforms
- Keychain access and modification
- NSURL session traffic capture (HTTP/HTTPS/WebSocket)
- WebView and JSContext inspection with JavaScript execution
- UI hierarchy dump and element highlighting
- Info.plist, entitlements, and binary cookie viewers
- Biometric (Touch ID / Face ID) bypass
- UserDefaults browser
- Pasteboard and file operation monitoring
- Geolocation spoofing
- Objective-C class and method inspection
- Open file handles and network connections (lsof)
- Security analysis (PIE, ARC, stack canaries, encryption)
- AndroidManifest.xml decoder and component browser (activities, services, receivers, providers)
- Android Keystore inspection with key attributes
- Content provider query, insert, update, and delete
- JNI call tracing with arguments, return values, and backtraces
- Java class inspection (methods, fields, interfaces)
- Intent building and launching
- Open file handles and network connections (lsof)
