Skip to content

Cookiecutter template for hooking traffic encrytion by frida

Notifications You must be signed in to change notification settings

ch-fun/cookiecutter-frida

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Overview

This is a cookiecutter template for bypassing the traffic encryption in Android app. Please read this article first.

Launch

Start echoServer

python echoServer.py

Start mitmproxy

mitmproxy -s mitmproxy_script/mitm.py --listen-host 0.0.0.0 -p {{ cookiecutter.mitm_frida_port }} --mode upstream:http://127.0.0.1:27080 -k
mitmproxy -s mitmproxy_script/mitm_http.py --listen-host 0.0.0.0 -p {{ cookiecutter.mitm_http_port }} --mode upstream:http://127.0.0.1:8081 -k

Start burpTracer, inject js

python burpTracer.py -s hook_script/hook.js -r {{ cookiecutter.frida_ip }}:{{ cookiecutter.frida_port }} -n {{ cookiecutter.app_name }}

or start rpc server:

python burpTracer.py -s hook_script/hook.js -r {{ cookiecutter.frida_ip }}:{{ cookiecutter.frida_port }} -n {{ cookiecutter.app_name }} --rpc hook_script/encrypt_rpc.js -a hook_script/proxy.js

Start RPC server

python rpc_server.py hook_script/encrypt_rpc.js

About

Cookiecutter template for hooking traffic encrytion by frida

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published