Fridagate is an Android application that combines essential tools for mobile security research into a single, streamlined interface:
- Frida Server Manager - download, install, start, stop, and uninstall frida-server directly from the device, with version selection and custom flag support.
- Burp Suite Proxy Controller - configure iptables transparent proxy rules and Android system proxy settings to route all device traffic through Burp Suite for interception.
- Bypass Injection (experimental) - on-device root detection and SSL pinning bypass using frida-inject, no PC required.
Instead of running multiple ADB commands manually before each pentest session, Fridagate lets you set up the entire interception stack in a single tap with the ACTIVATE ALL button.
- Global status overview (root, Frida, proxy, Burp reachability)
- ACTIVATE ALL - starts frida-server and enables iptables proxy in one tap
- DEACTIVATE ALL - cleanly tears down the entire setup
- Unified operation log
- Fetches available releases directly from the GitHub API
- Auto-detects device CPU architecture (
arm64,arm,x86_64,x86) - Downloads and decompresses
.xz/.zipbinaries - Installs to
/data/local/tmp/frida-servervia root - Start with default settings or custom flags (e.g.,
-l 0.0.0.0:27042 --token=secret) - Version tracking across app restarts
- iptables transparent proxy - redirects all TCP traffic on ports 80/443 to Burp Suite regardless of app proxy settings
- System proxy - sets Android's global HTTP proxy for apps that respect it
- One-tap connectivity test to verify Burp is reachable
- Burp CA certificate installer (required for HTTPS interception)
- Saves Burp IP and port settings across sessions
- Root Detection Bypass - hooks
File.exists(),Runtime.exec(),SystemProperties, andPackageManagerto hide root indicators (su binaries, Magisk, SuperSU, build flags) - SSL Pinning Bypass - bypasses certificate pinning for TrustManager, OkHttp, Conscrypt, HostnameVerifier, and Android Network Security Config
- App picker dropdown โ lists all non-system installed apps
- Downloads
frida-injectat the same version asfrida-server(no PC required) - Single Launch button spawns the target app with selected scripts injected from the first instruction
-
โ ๏ธ Some apps may not be compatible. Report issues at github.com/JavierOlmedo/Fridagate/issues
| Requirement | Details |
|---|---|
| Rooted Android device | Root is required for iptables, frida-server install, and cert installation |
| Android 7.0+ | Minimum SDK 24 |
| Burp Suite | Running on a PC connected to the same network as the device |
| Internet connection | To download Frida server binaries from GitHub |
- Open Burp Suite on your PC
- Go to
Proxy โ Options โ Addand create a listener on0.0.0.0:8080 - Note your PC's local IP address (e.g.,
192.168.100.224)
- Open Fridagate โ Frida tab
- Select the desired version from the dropdown (latest is pre-selected)
- Tap Install / Update Frida Server and wait for the download and installation
Recommended version: 16.7.19 The latest Frida versions (17.x) may have spawn issues on some devices. Version 16.7.19 is the most stable for general use.
To install it, scroll to the bottom of the version dropdown and tap โ Custom version..., then type
16.7.19.Make sure your PC tools match the same version:
pip install frida==16.7.19 frida-tools==12.5.0
- Go to the Proxy tab
- Enter your PC's IP address (
192.168.100.224) and Burp's port (8080) - Tap Test to verify connectivity
- Go to the Dashboard tab
- Tap ACTIVATE ALL
- Fridagate will start frida-server and enable the iptables proxy automatically
- Make sure the system proxy is enabled (Proxy tab)
- Tap Install Burp CA Certificate
- Reboot the device for all apps to recognize the certificate
Fridagate is built with modern Android development practices:
- Jetpack Compose - declarative UI
- MVVM - ViewModels hold state, screens observe and react
- Kotlin Coroutines - all network and root operations run on background threads
- StateFlow - reactive state management between ViewModel and UI
- DataStore - persistent storage for user settings
- OkHttp - HTTP client for GitHub API and binary downloads
- Navigation Compose - single-Activity navigation with bottom tabs
Android App
โ
โผ (port 80 / 443)
iptables NAT (DNAT rule)
โ
โผ redirected transparently
Burp Suite Proxy (192.168.100.224:8080)
โ
โผ decrypts with its CA cert
Internet
The iptables DNAT rules intercept outgoing TCP packets destined for ports 80 and 443 and rewrite their destination to Burp Suite's IP and port - without the app knowing. This works even for apps that explicitly disable proxy support.
Fridagate is intended for authorized security testing only. Only use this tool on devices and applications you own or have explicit written permission to test. Unauthorized interception of network traffic may be illegal in your jurisdiction. The author assumes no responsibility for misuse of this software.
This project is licensed under the MIT License - see the LICENSE file for details.
Made with โค๏ธ in Spain