A seamless tool for injecting Frida Gadget into APKs, bridging security and dynamic analysis with ease. FridaFusion is a powerful Python-based tool designed for tampering with Android APK files to enhance security analysis, penetration testing, and application debugging. This tool provides a streamlined process for modifying APKs by injecting the Frida gadget for dynamic instrumentation, altering Smali code, and manipulating application metadata.
-
APK Decoding:
- APKTool decodes Android APK files using the
apktoolcommand, allowing users to access and modify the underlying structure, including resources and the AndroidManifest.xml file.
- APKTool decodes Android APK files using the
-
Frida Gadget Injection:
- The tool enables seamless injection of the Frida gadget into APKs, facilitating dynamic analysis and runtime manipulation of the application.
-
Customizable Hooks:
- Users can modify Smali code to insert custom hooks, allowing them to extend or alter the application's functionality during runtime.
-
Version Code Tampering:
- APKTool provides the ability to increment version codes in the
apktool.ymlfile, making it easier to test modified versions of applications without conflicts.
- APKTool provides the ability to increment version codes in the
-
APK Building and Signing:
- After modifications, APKTool rebuilds the APK and signs it using a generated keystore, ensuring that the modified APK can be installed on devices without integrity issues.
-
Logging and Error Handling:
- The tool includes comprehensive logging to provide insights into the process and troubleshoot any errors that may arise during execution.
-
Certificate Management:
- Users can convert DER certificates to PEM format and generate new certificates as needed for secure communication with proxy servers.
The script accepts the following command-line arguments:
-
-aor--target-apk:
Required
Specify the path to the target APK file you want to modify. -
-cor--proxy-cert:
Optional
Specify the path to the proxy certificate in DER format. This is used for secure communication with proxy servers. -
-gor--frida-gadget:
Required
Specify the path to the Frida gadget file that will be injected into the APK. -
-ror--device-arch:
Required
Specify the device architecture (e.g.,x86,arm, etc.) for the APK modification.
To run the script, use the following command:
python main.py -a path/to/your.apk -c path/to/certificate.der -g path/to/frida-gadget.so -r x86
