Skip to main content
Glama
dryfryce

Frida MCP Server

by dryfryce

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault

No arguments

Capabilities

Features and capabilities supported by this server

CapabilityDetails
tools
{
  "listChanged": false
}
experimental
{}

Tools

Functions exposed to the LLM to take actions

NameDescription
frida_list_devices

List all available Frida devices (local, USB, remote). Returns device ID, name, and type.

frida_get_device_info

Get detailed information about a specific device including system parameters.

frida_list_processes

List all running processes on a device. Returns PID, name, and parameters.

frida_list_applications

List all installed applications on a device (useful for mobile devices).

frida_get_process

Get detailed info about a specific process by name or PID.

frida_spawn

Spawn a new process in suspended state. Returns PID. Use frida_resume to start it.

frida_resume

Resume a spawned process.

frida_kill

Kill a process by PID.

frida_attach

Attach to a running process. Returns a session ID for further operations.

frida_detach

Detach from a session.

frida_inject_script

Inject and run a Frida JavaScript script in a process. The script can hook functions, intercept calls, modify behavior, read memory, etc.

frida_unload_script

Unload a previously injected script.

frida_rpc_call

Call an exported RPC function in an injected script.

frida_trace

Trace function calls matching a pattern. Returns call logs with arguments and return values.

frida_memory_scan

Scan process memory for a pattern.

frida_memory_read

Read bytes from a specific memory address.

frida_memory_write

Write bytes to a specific memory address.

frida_list_modules

List all loaded modules/libraries in a process.

frida_list_exports

List all exported functions from a module.

frida_list_imports

List all imported functions in a module.

frida_pull_file

Pull/download a file from the device.

frida_push_file

Push/upload a file to the device.

frida_hook_function

Hook a specific function to log calls, modify arguments, or change return values.

frida_intercept_method

Intercept an Objective-C method (iOS) or Java method (Android).

frida_evaluate

Evaluate arbitrary JavaScript in the Frida runtime of an attached process.

frida_get_frontmost

Get the frontmost application (mobile devices).

frida_java_enumerate_classes

Enumerate all loaded Java classes (Android). Returns class names matching an optional pattern.

frida_java_hook_method

Hook a Java method (Android). Log calls, modify args/return values.

frida_java_find_instances

Find live instances of a Java class on the heap (Android).

frida_java_call_method

Call a method on a Java class or instance (Android).

frida_objc_enumerate_classes

Enumerate all loaded Objective-C classes (iOS/macOS).

frida_objc_hook_method

Hook an Objective-C method (iOS/macOS).

frida_objc_find_instances

Find live instances of an ObjC class on the heap (iOS/macOS).

frida_stalker_trace

Trace execution at instruction/block level using Stalker. Very powerful but heavy.

frida_resolve_exports

Find functions matching a pattern using ApiResolver. Supports wildcards.

frida_inject_library

Inject a shared library (.so/.dll/.dylib) into the target process.

frida_enable_spawn_gating

Enable spawn gating to intercept new processes before they run.

frida_disable_spawn_gating

Disable spawn gating.

frida_get_pending_spawn

Get list of processes waiting in spawn gate.

frida_get_process_info

Get detailed info about the attached process (arch, platform, threads, etc.).

frida_search_strings

Search for strings in process memory.

frida_compile_agent

Compile a Frida agent (JavaScript/TypeScript) using frida-compile. Useful for complex agents with dependencies.

frida_apk_inspect

Inspect an Android APK file using frida-apk.

frida_memory_alloc

Allocate memory in the target process. Returns the address of allocated memory.

frida_memory_protect

Change memory protection/permissions for a memory region.

frida_enumerate_ranges

Enumerate memory ranges/maps in the process with their protections.

frida_enumerate_threads

List all threads in the process with their state and context.

frida_backtrace

Get stack backtrace for a thread. Useful for debugging and analysis.

frida_debug_symbol

Resolve debug symbol information from an address or find address from symbol name.

frida_list_symbols

List debug symbols from a module.

frida_native_function

Call a native function directly by address or name. Specify return type and argument types.

frida_cmodule

Compile and load inline C code for high-performance hooks. Returns symbols exported by the C code.

frida_objc_call_method

Call an Objective-C method on a class or instance (iOS/macOS).

frida_java_load_dex

Load a DEX file dynamically into the Android runtime.

frida_socket_connect

Create a socket connection from within the target process.

Prompts

Interactive templates invoked by user choice

NameDescription

No prompts

Resources

Contextual data attached and managed by the client

NameDescription

No resources

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/dryfryce/frida-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server