FridaBypassKit
Android Universal Anti-Bypass Framework - Root, SSL Pinning, Emulator & Debug Detection Bypass
Install / Use
/learn @okankurtuluss/FridaBypassKitREADME
Frida Bypass Kit
A powerful Frida script that bypasses common Android security detections and restrictions.
Features
Root Detection Bypass - Hides root/su binaries, Magisk, and root management apps SSL Pinning Bypass - Intercepts and bypasses SSL certificate pinning Emulator Detection Bypass - Spoofs device properties to appear as real device Debug Detection Bypass - Prevents apps from detecting debugging tools
Requirements
- Rooted Android device or emulator
- Frida installed on your computer
- Frida-server running on the Android device
- Python 3.x (for Frida installation)
1. Install Frida on your computer:
pip install frida-tools
2. Download and install frida-server on Android:
Check your device architecture
adb shell getprop ro.product.cpu.abi
Download the correct frida-server from:
https://github.com/frida/frida/releases
Push frida-server to device
adb push frida-server /data/local/tmp/
adb shell chmod 755 /data/local/tmp/frida-server
Run frida-server as root
adb shell su -c /data/local/tmp/frida-server &
Usage
Spawn and hook application
frida -U -f com.example.app -l FridaBypassKit.js
Tested Applications
This script has been tested and works with many applications that implement:
- Root detection (RootBeer, SafetyNet, custom implementations)
- SSL pinning (OkHttp, custom TrustManagers)
- Emulator detection
- Anti-debugging techniques
Root Detection Bypass
- Hooks File.exists() to hide su binaries
- Intercepts Runtime.exec() calls for root checks
- Hides root-related packages from PackageManager
- Modifies system properties to appear unrooted
SSL Pinning Bypass
- Hooks TrustManagerImpl.verifyChain() method
- Hooks TrustManagerImpl.checkTrustedRecursive() method
- Bypasses certificate chain verification
- Returns empty certificate chains to avoid validation
- Works with most Android SSL implementations including OkHttp, Retrofit, and custom implementations
Emulator Detection Bypass
- Spoofs telephony manager values
- Returns fake phone numbers and operator names
- Modifies build properties
Debug Detection Bypass
- Hooks Debug.isDebuggerConnected()
- Prevents debugger detection
- Bypasses anti-debugging checks
Disclaimer
This tool is for educational and research purposes only. Users are responsible for complying with applicable laws and regulations. The authors are not responsible for any misuse or damage caused by this tool.
Related Skills
node-connect
346.4kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
107.2kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
346.4kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
346.4kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
