An helper for mobile applications analysis
StagMan is a front end for frida (https://github.com/frida/frida). It is made for speeding up the reverse engineering activity using useful frida-script and allowing to see results in real time.
- Python (version 3)
- python-frida (https://github.com/frida/frida-python)
- urwid (http://urwid.org/)
- npm (https://www.npmjs.com/)
- frida-compile (https://github.com/frida/frida-compile)
- frida-fs (https://github.com/nowsecure/frida-fs)
For Arch: yay -S python python-urwid npm python-frida && npm install frida-compile -g && npm install frida-fs -g
After installing the dependencies, simply git clone <URL> and run ./stagman.py
usage: stagman.py [-h] [-a STRING] [-d STRING] [-p STRING [STRING ...]] [-x]
[--headless]
Stagman V.1.0
optional arguments:
-h, --help show this help message and exit
-a STRING, --application STRING
Select the application to spawn
-d STRING, --device STRING
Set the device ID
-p STRING [STRING ...], --plugins STRING [STRING ...]
Set the list of plugins
-x, --respawn Auto respawn of the application
--headless Start in headless mode
The interface is divided in two main block: a main view and a bottom status information bar.
In the status bar there are this information:
- Plugin enabled
- Device connected
- Application selected
- Respawn: this allow to select the behaviour of frida (respawn the application or hook to the running one).
- Running: if the hooking is in running
hView the help menurRun the selected applicationsStop the frida hookingRReturn to home pagevWindows selectionpPlugins selectionxToggle respawing behaviouraContext menu (based on the window)qQuitnOpen a 'notepad'. This will create a fileref.txt. Usefull for taking notes during analysis.kOpen a terminal.ctrl dfor detaching.
The available plugins are:
TLS Connection: this plugin hooksTLS_ReadandTLS_Writefunctions so we can intercept the TLS traffic before the encryption and without using a proxy.- Context menu:
eexport selected packet.EExport all the packets in PCAP format.
Low Level Network: this plugin hooks to low level network functions (like socket, recv, sendmsg, ecc.) and it allows to intecerpet traffic at lower level. There is also the IPC traffic (unix domain socket). It is a bit heavy so I suggest to stop the hooking before the analysis.File open: this plugin hooks open system call so we can see the opened files. Thanks tofrida-fswe can download the file and perform an offline analysis.- Context menu:
eexport selected file.Eexport all the files
Without arguments the application will start in GUI mode. The home page allows to select the device where frida-server is running and, after the selection, a list of the applications.
A lot of things, any help would be appreciate. Roadmap:
- iOS Support
- Local server support
- TCP Frida Server
- More plugins
- Headless function
- Auto-analyzer