A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, for dynamic function hooking and intercepting.
House is a runtime mobile application analysis toolkit that provides a web-based graphical interface for dynamic function hooking and intercepting. It leverages Frida to instrument Android applications in real-time, enabling security researchers to analyze app behavior, modify function arguments, and trace execution flows without extensive manual scripting.
Security researchers, penetration testers, and mobile application analysts who need to perform dynamic analysis on Android applications, especially those looking to simplify Frida-based instrumentation.
House stands out by offering a user-friendly Web GUI that abstracts away the complexity of writing Frida scripts manually, making dynamic analysis more accessible. Its integrated features like function intercepting, enumeration tools, and monitor templates streamline the assessment process compared to using raw Frida alone.
A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Offers a browser-based interface that abstracts Frida scripting complexity, enabling dynamic analysis without deep command-line expertise, as shown in the Web GUI features and usage gifs.
Supports real-time function hooking in dynamically loaded dex and jar files, extending analysis to code that loads at runtime, highlighted in the news and example gifs.
Includes a REPL for modifying function arguments and return values on the fly, with helper functions like inspectObject and setRetval, demonstrated in the function intercepting examples.
Dynamically generates hook scripts from configurable templates to monitor key operations like file I/O and IPC, reducing manual script writing effort.
Requires a rooted Android device with Frida-server running, which is a significant barrier in locked-down or enterprise environments where rooting is prohibited.
Key modules like Monitor and Sideload are labeled as experimental in the README, indicating potential bugs and incomplete functionality that may hinder reliable use.
Prone to errors from version mismatches between local Frida and server, and issues like time-outs with multiple USB devices, adding setup and maintenance overhead.
Limited to Android analysis with no support for iOS or other platforms, restricting its utility for comprehensive mobile security assessments.