11/12 free views
Tool
Other
Penetration Testing & Red Teaming

magisk-frida

by ViRb3

1.2Kstars
150forks
27watchers
Updated 8 months ago
About

MagiskFrida enables automatic running of frida-server on boot across multiple Android root solutions, ensuring it stays always up-to-date.

🔐 Run frida-server on boot with Magisk, always up-to-date

Primary Use Case

This tool is primarily used by penetration testers, reverse engineers, and security researchers who need to run Frida's dynamic instrumentation server persistently on rooted Android devices. It simplifies maintaining frida-server availability by integrating with popular root management solutions, enabling seamless mobile security testing and exploitation.

Key Features
  • Runs frida-server automatically on device boot
  • Supports multiple root solutions: Magisk, KernelSU, APatch
  • Compatible with arm64, arm, x86, and x86_64 architectures
  • Instant updates tied to the official Frida build process
  • Provides troubleshooting guidance
  • Allows manual building and packaging of the module

Installation

  • Download MagiskFrida.zip from the releases page
  • Install the MagiskFrida.zip module via your root management tool
  • Do not use the obsolete Magisk modules repository for installation

Usage

>_ uv sync

Synchronizes the build environment before building the module

>_ uv run python3 main.py

Builds the MagiskFrida release ZIP package

Security Frameworks
Initial Access
Execution
Persistence
Defense Evasion
Discovery
Usage Insights
  • Integrate MagiskFrida with automated red team frameworks to enable persistent instrumentation on Android devices during engagements.
  • Use the tool to maintain stealthy persistence of dynamic instrumentation for advanced mobile malware analysis and reverse engineering.
  • Combine with mobile threat hunting tools to simulate adversary techniques and improve blue team detection capabilities.
  • Leverage instant frida-server updates to ensure compatibility with latest Android versions and security patches during testing.
  • Deploy in purple team exercises to validate detection rules and response workflows against real-time mobile exploitation scenarios.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about magisk-frida. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team90%
Blue Team20%
Purple Team60%
Details
LanguageShell
Open Issues47
Topics
magisk
frida
reverse-engineering
android
security
exploitation
root