Skip to content

Auto Frida v2.0 by Omkar Mirkute — Complete Android Security...#1961

Open
carlospolop wants to merge 1 commit intomasterfrom
update_Auto_Frida_v2_0_by_Omkar_Mirkute___Complete_Androi_20260304_184922
Open

Auto Frida v2.0 by Omkar Mirkute — Complete Android Security...#1961
carlospolop wants to merge 1 commit intomasterfrom
update_Auto_Frida_v2_0_by_Omkar_Mirkute___Complete_Androi_20260304_184922

Conversation

@carlospolop
Copy link
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

  • Blog URL: https://github.com/ommirkute/Auto-Frida
  • Blog Title: Auto Frida v2.0 by Omkar Mirkute — Complete Android Security Testing Automation
  • Suggested Section: 📱 Mobile Pentesting → Android Applications Pentesting → Frida Tutorial / Objection Tutorial (add a subsection on automation frameworks like Auto-Frida, spawn-mode strategy, and consolidated hook generation for bypassing SSL pinning/root/emulator/anti-Frida)

🎯 Content Summary

Title / Scope
Auto Frida v2.0 (repo: https://github.com/ommirkute/Auto-Frida) is an Android security testing automation toolkit built around Frida (https://frida.re/) to make dynamic instrumentation repeatable and reliable. It automates host/device setup, Frida server provisioning, app enumeration, protection detection, and automatic generation + execution of a consolidated bypass script for common mobile defenses (SSL pinning, root/emulator/ADB detection, ...

🔧 Technical Details

Spawn-mode Frida instrumentation to beat early checks: Install hooks before the app’s Java/native code executes (spawn-mode) to avoid attach-mode race conditions where protections (SSL pinning, root/emulator checks, anti-debug/anti-Frida) run during early initialization and can be missed or can terminate the app before hooks are active.

Protection detection via weighted multi-signal classification: Detect which defenses are present by correlating multiple hook-trigger indicators (50+ patterns) and classifying them with a confidence score/percentage. If expected telemetry (e.g., JSON events) is absent, synthesize ProtectionFinding objects from observed hook activations; increase confidence by +10% when multiple findings map to the same protection type; tune detection time windows (30s–120s) to catch late/lazy-loaded checks.

“Hook exactly once” consolidation to prevent double-hook crashes: Merge bypass logic so each Java method and native ...

🤖 Agent Actions

Summary: Added an Auto-Frida automation subsection to the Android anti-instrumentation page, emphasizing spawn-mode early checks, consolidated hook generation, and stable frida-server lifecycle handling, plus a quick-start snippet and reference entry.

Files changed:

  • src/mobile-pentesting/android-app-pentesting/android-anti-instrumentation-and-ssl-pinning-bypass.md

Tests: Not run (docs-only change).

If you want next steps:

  1. Add a short Auto-Frida usage example showing spawn-mode selection and post-generation verification flow.

This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

@carlospolop
Copy link
Collaborator Author

🔗 Additional Context

Original Blog Post: https://github.com/ommirkute/Auto-Frida

Content Categories: Based on the analysis, this content was categorized under "📱 Mobile Pentesting → Android Applications Pentesting → Frida Tutorial / Objection Tutorial (add a subsection on automation frameworks like Auto-Frida, spawn-mode strategy, and consolidated hook generation for bypassing SSL pinning/root/emulator/anti-Frida)".

Repository Maintenance:

  • MD Files Formatting: 954 files processed

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant