Skip to main content
Glama
0xhackerfren

Frida Game Hacking MCP

by 0xhackerfren

call_rpc

Execute RPC methods from loaded scripts to interact with game processes, enabling remote procedure calls for game hacking and reverse engineering tasks.

Instructions

Call an RPC export from a loaded script. Args: name: Name of the loaded script method: RPC method name to call args: Arguments to pass Returns: RPC result.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
nameYes
methodYes
argsNo

Implementation Reference

  • The main handler function for the 'call_rpc' tool. It invokes RPC methods exported by previously loaded custom Frida scripts using script.exports.method(*args). Requires a prior call to load_script.
    @mcp.tool() def call_rpc(name: str, method: str, args: List[Any] = None) -> Dict[str, Any]: """ Call an RPC export from a loaded script. Args: name: Name of the loaded script method: RPC method name to call args: Arguments to pass Returns: RPC result. """ global _session if name not in _session.custom_scripts: return {"error": f"Script '{name}' not found"} try: script = _session.custom_scripts[name] rpc_method = getattr(script.exports, method) result = rpc_method(*(args or [])) return {"success": True, "method": method, "result": result} except AttributeError: return {"error": f"RPC method '{method}' not found"} except Exception as e: return {"error": f"RPC call failed: {str(e)}"}

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/0xhackerfren/frida-game-hacking-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server