Frukah

Project Url: rortega/Frukah
Introduction: This is a Frida/Gui tool is used for dynamic analysis of android applications. The tool allows you to inject/hook javascript to various java methods. This will allow you to follow/modify the applications logic. This tool is normally used for pentesting applications.
More: Author   ReportBugs   
Tags:

Is a Frida/Gui tool used for dynamic analysis on android applications. The tool allows you to inject/hook javascript to various java methods. This will allow you to follow/modify the applications logic. This tool is normally used for pentesting mobile/android applications.

This tool does require Frida and PySimpleGui. Go to(https://frida.re/docs/android/) to install Frida use pip to install PySimpleGui. Tool at the moment has not been tested on a windows environment.

At the moment, this application will only work on Android Studio Emulator. Future releases will work on any mobile device and any thick client (.exe)

To start using:

  1. Open a virtiual device in Android - Make sure Frida Server is running (see https://frida.re/docs/android/)
  2. Open the app (e.g., DIVA) you want to Hook/Frukah into
  3. In the Command line enter "$python3 frukah.py"
  4. In Frukah, enter the App name such as for DIVA as shown in the provided screen capture. Note, click on "Show Avail Apps" to see loaded applications
  5. Click on "Hook App"
  6. Select modules/classes you want to Hook/Frukah such as Database, File Access, Shared Preferences, and HTTP

image

Frukah Memory

This is a Frida/Gui tool used for searching string patterns in memory then used to modify the content. (see screen capture)

This tool does require Frida and PySimpleGui. Go to(https://frida.re/docs/android/) to install Frida use pip to install PySimpleGui. Tool at the moment has not been tested on a windows environment.

To start using:

  1. Open a virtiual device in Android - Make sure Frida Server is running (see https://frida.re/docs/android/)
  2. Open the app (e.g., DIVA) or app you want to Hook/Frukah Memory into
  3. In the Command line enter "$python3 frukah_memory.py"
  4. In Frukah, enter the App PID such as for 4507 as shown in the provided screen capture. Note, click on "Show Avail Apps" to see loaded applications
  5. Click on "Hook App"
  6. Start searching for strings in memory then modify the string by providing the correct memory location.

image

Apps
About Me
GitHub: Trinea
Facebook: Dev Tools