2 minutes
Frida APK Patcher
This tool allows you to patch APK files for Frida instrumentation using the Frida gadget. It injects the required libraries and smali code into the APK, re-signs it, and ensures the APK is ready to use with Frida for reverse engineering or penetration testing.
Features
- Disassembles APK files using
apktool
- Adds
INTERNET
permission and customnetwork_security_config.xml
if not already present - Injects Frida gadget libraries into the APK
- Modifies the APK’s smali code to load the Frida gadget
- Rebuilds, aligns, and signs the APK for use
- Compatible with Android versions that support APK Signature Schemes v1 and v2
Prerequisites
Before using this tool, ensure the following tools are installed on your system:
aapt
(Android Asset Packaging Tool)apktool
zipalign
apksigner
- Python 3.x
- Java Development Kit (JDK) for APK signing
Usage
Step 1: Clone the Repository
git clone https://github.com/sperixlabs/frida-apk-patcher.git
cd frida-apk-patcher
Step 2: Prepare Your APK
Place the APK you want to patch in a known directory. Note the absolute path to the APK, as it will be needed during execution.
Step 3: Download Frida Gadget
Run getlibs.sh
to fetch the latest Frida Gadgets
bash getlibs.sh
Step 4: Run the Tool
Run the script with the path to the APK you want to patch. Here’s the command:
python apk_builder.py --apk /path/to/your.apk
Example
python apk_builder.py --apk /home/user/downloads/sample.apk
Step 5: Patched APK Output
After the tool finishes running, it will output the patched APK file as your-apk-appmon.apk
in the same directory where the original APK was located.
Options
--apk
: Absolute path to the APK you want to patch.
Output Files
- The patched APK file will be created in the current working directory as
app_name-appmon.apk
.
Usage
- Over USB
frida -U Gadget -l [frida_script]
- Specific Device
frida Gadget -l [frida_script] -D [device_name]