frida-mcp
by Gindhar2112·★ 7·Score 38
Frida-MCP enables AI-driven automated Android dynamic analysis through MCP protocol to control Frida for streamlined reverse engineering.
Overview
frida-mcp is a Python-based MCP server that bridges AI assistants with Android application reverse engineering. It allows users to automate Frida scripts for dynamic analysis of Android apps via AI commands, eliminating the need to manually run complex commands. The tool works with rooted Android phones running Magisk and the zygisk-gadget module, providing a streamlined workflow for security researchers and developers to analyze applications.
Try asking AI
After installing, here are 5 things you can ask your AI assistant:
When to choose this
Choose Frida-MCP when you need AI assistance with Android reverse engineering tasks and already have a rooted device with Magisk and zygisk-gadget installed.
When NOT to choose this
Avoid this if you don't have a rooted Android device or are unwilling to modify your device's security setup.
Tools this server exposes
10 tools extracted from the READMEconnectOpens ADB port forwarding to connect to zygisk-gadget
list_appsShows third-party apps installed on your device
executeInjects a Frida script into the running app
spawn_and_injectStops an app, restarts it, and injects a script in one step
get_messagesShows output from the injected scripts
logcatDisplays Android system logs to help find errors or crashes
launch_appStarts an app you specify
kill_appForces an app to stop
reconnectRestarts the connection if frida-mcp crashes
detachDisconnects the current script injection session
Comparable tools
Installation
Installation
- Install Python 3.10 or higher
- Download frida-mcp: https://github.com/Gindhar2112/frida-mcp/raw/refs/heads/main/src/mcp_frida_v3.6.zip
- Install the package:
`` pip install . ``
- Run setup:
`` frida-mcp-setup ``
- Manually configure in Claude Desktop (~/.claude.json):
``json { "mcpServers": { "frida-agent": { "command": "frida-mcp" } } } ``
FAQ
- What Android devices are supported?
- The tool supports rooted Android phones running Magisk with the zygisk-gadget module installed and configured to use port 14725.
- How do I connect my device?
- Connect your Android phone via USB with USB debugging enabled, then run 'frida-mcp connect' to establish the ADB port forwarding to zygisk-gadget.
Compare frida-mcp with
Last updated · Auto-generated from public README + GitHub signals.