A Burp Suite extension that bridges to Frida, enabling dynamic analysis and manipulation of mobile app traffic using the app's own code.
Brida is a Burp Suite extension that integrates with the Frida dynamic instrumentation framework to enable advanced mobile application security testing. It allows testers to intercept and manipulate HTTP traffic by directly calling the application's own methods for encryption, decryption, or other logic, bypassing the need to reverse-engineer and reimplement complex routines.
Security professionals, penetration testers, and reverse engineers who assess mobile applications (Android/iOS) and need to analyze or tamper with traffic protected by custom encryption, obfuscation, or signatures.
Brida dramatically reduces the time and effort required to analyze secured mobile traffic by leveraging Frida to execute the app's native functions within Burp Suite, eliminating the need to extract keys or reimplement cryptographic logic from scratch.
The new bridge between Burp Suite and Frida!
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Graphically inspect and tamper with Java/Objective-C methods using Frida hooks from within Burp Suite, allowing direct manipulation of app logic during traffic analysis as described in the Key Features.
Create Burp plugins that decrypt, encrypt, or sign requests/responses using the app's native functions via Frida exports, eliminating the need to reverse-engineer and reimplement security routines, per the Philosophy section.
Browse binary classes and methods visually and add inspection or tamper hooks from a tree representation, speeding up reverse engineering without leaving Burp Suite, as highlighted in the README's tools list.
Write and manage custom Frida scripts with syntax highlighting directly in Burp, reducing context switching and easing script development for dynamic instrumentation.
Requires installation of NodeJS, npm, Frida, and pyro4, plus a rooted/jailbroken device with frida-server, which the README notes can be challenging, especially on macOS with path issues.
Brida >=0.6 requires Frida >=17, breaking compatibility with older versions and forcing users to manage multiple installations or downgrade, as admitted in the requirements section.
Demands proficiency in Frida scripting and mobile reverse engineering; despite GUI aids, creating effective hooks and plugins requires advanced skills beyond basic Burp usage.