SoFrida
soFrida - Dynamic Analysis Tool for Mobile Applications
Install / Use
/learn @june5079/SoFridaREADME
Table of Contents
- [How to install and run soFrida+]
- Requirements for Analysis
- Installing soFrida+
- [Guides and tutorials]
- [Main Features]
- Authors
- Disclaimer
- LICENSE
Requirements
- Rooted Android mobile phone or Jailbroken iPhone for hooking process
- Web browser without AD-Block plugins
- Chrome or Firfox driver
- Support OS : MacOS, Windows, Ubuntu (Tested)
- Only works with higher Python3.6
- Ethical mind 👍
Installing soFrida+
python3 -m pip install -r requirements.sf
That's it. You're ready to hack Cloud-backend 😎
python3 app.py
Open your favorite browser and connect to http://127.0.0.1:8888 You can change port by modifying app.py (End of the code)
Video Tutorials
Main Features > Getting Ready
-
<img src = 'static/README_Images/select_device.png'>Select Device : Select a target device. soFrida+ automatically detects devices. -
<img src = 'static/README_Images/apk_download.png'>Download - Playstore : Download APK Files from Google Play -
<img src = 'static/README_Images/pull_device.png'>Pull - Device : Pull APK Files from mobile phone and check cloud SDK
Main Features > Analysis of Vulnerabilities (Android App)
-
<img src = 'static/README_Images/analysis_cloud_select.png'>Analysis - Cloud : Automated analysis for cloud SDK misconfiguration. Select a target appliation and click on "Analyze" button. -
<img src = 'static/README_Images/select_class.png'>Analysis - Manual : You can select speific target class and methods to hook. soFrida+ will automatically generate hooking script based on your choice.
Main Features > Analysis of Vulnerabilities (iOS App)
Analysis - iOS Manual : You can select speific target object and methods to hook. soFrida+ will automatically generate hooking script based on your choice.<img src = 'static/README_Images/iOS_Manual.png'>
Make Your Own Preset
You can save and load a hooking script. Once you SET a preset script, it will be loaded in the background. This will be very useful when you try bypass security mitigations.<img src = 'static/README_Images/preset_save.png'>
Authors
Hyunjun Park - Hyunjun Park is a senior engineer of Samsung SDS in South Korea and a graduate student of SANE Lab in Korea University (Supervisor : Seungjoo Gabriel Kim). His daily job is pentesting a broad range of Samsung products including smart phone, smart TV, wearable devices, etc. He also serves as a main staff of Kimchicon Security Conference in South Korea.
Soyeon Kim - Soyeon Kim is a security researcher of Samsung SDS in South Korea. She mainly doing a security assessment of Samsung IoT products. She is interested in analyzing Android apps and IOS apps using Frida.
Seungjoo (Gabriel) Kim - Seungjoo (Gabriel) Kim is a professor of Graduate School of Information Security at Korea University from 2011. For the past 7 years he was an associate professor of Sungkyunkwan University and have 5 years of back ground of team leader of Cryptographic Technology Team and also IT Security Evaluation Team of KISA(Korea Internet & Security Agency). In addition to being a professor, he is positioning a director of CHAOS(Center for High-Assurance Operating Systems), a head of SANE(Security Analysis aNd Evaluation) Lab, an adviser of hacking club ‘CyKor(two-times champion of DEF CON CTF 2015 & 2018)’ of Korea University, and a founder/advisory director of an international security & hacking conference ‘SECUINSIDE’.
Yeongjin Jang - Yeongjin Jang is an assistant professor of Computer Science at Oregon State University. He hacks CPU, OS, iPhone, IoT devices, and anything that is operated by computers, and wish to make systems secure against the vulnerabilities discovered. He is a two-times champion of DEF CON CTF (DEFKOR and DEFKOR00T). Biography
Disclaimer
Please Note that this is a research project. We are by no means responsible for any usage of this tool. Use on your own behalf. We're not also not responsible if your accounts get banned due to extensive use of this tool.
License
This project is licensed under the MIT License - see the LICENSE file for details
Related Skills
node-connect
346.8kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
107.6kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
346.8kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
346.8kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。

