Frida MCP Server
Server Configuration
Describes the environment variables required to run the server.
| Name | Required | Description | Default |
|---|---|---|---|
No arguments | |||
Capabilities
Features and capabilities supported by this server
| Capability | Details |
|---|---|
| tools | {
"listChanged": false
} |
| experimental | {} |
Tools
Functions exposed to the LLM to take actions
| Name | Description |
|---|---|
| frida_list_devicesA | List all available Frida devices (local, USB, remote). Returns device ID, name, and type. |
| frida_get_device_infoC | Get detailed information about a specific device including system parameters. |
| frida_list_processesB | List all running processes on a device. Returns PID, name, and parameters. |
| frida_list_applicationsC | List all installed applications on a device (useful for mobile devices). |
| frida_get_processC | Get detailed info about a specific process by name or PID. |
| frida_spawnA | Spawn a new process in suspended state. Returns PID. Use frida_resume to start it. |
| frida_resumeC | Resume a spawned process. |
| frida_killC | Kill a process by PID. |
| frida_attachC | Attach to a running process. Returns a session ID for further operations. |
| frida_detachC | Detach from a session. |
| frida_inject_scriptC | Inject and run a Frida JavaScript script in a process. The script can hook functions, intercept calls, modify behavior, read memory, etc. |
| frida_unload_scriptC | Unload a previously injected script. |
| frida_rpc_callC | Call an exported RPC function in an injected script. |
| frida_traceC | Trace function calls matching a pattern. Returns call logs with arguments and return values. |
| frida_memory_scanC | Scan process memory for a pattern. |
| frida_memory_readC | Read bytes from a specific memory address. |
| frida_memory_writeC | Write bytes to a specific memory address. |
| frida_list_modulesC | List all loaded modules/libraries in a process. |
| frida_list_exportsC | List all exported functions from a module. |
| frida_list_importsC | List all imported functions in a module. |
| frida_pull_fileC | Pull/download a file from the device. |
| frida_push_fileC | Push/upload a file to the device. |
| frida_hook_functionC | Hook a specific function to log calls, modify arguments, or change return values. |
| frida_intercept_methodC | Intercept an Objective-C method (iOS) or Java method (Android). |
| frida_evaluateC | Evaluate arbitrary JavaScript in the Frida runtime of an attached process. |
| frida_get_frontmostC | Get the frontmost application (mobile devices). |
| frida_java_enumerate_classesC | Enumerate all loaded Java classes (Android). Returns class names matching an optional pattern. |
| frida_java_hook_methodC | Hook a Java method (Android). Log calls, modify args/return values. |
| frida_java_find_instancesC | Find live instances of a Java class on the heap (Android). |
| frida_java_call_methodC | Call a method on a Java class or instance (Android). |
| frida_objc_enumerate_classesC | Enumerate all loaded Objective-C classes (iOS/macOS). |
| frida_objc_hook_methodC | Hook an Objective-C method (iOS/macOS). |
| frida_objc_find_instancesC | Find live instances of an ObjC class on the heap (iOS/macOS). |
| frida_stalker_traceB | Trace execution at instruction/block level using Stalker. Very powerful but heavy. |
| frida_resolve_exportsC | Find functions matching a pattern using ApiResolver. Supports wildcards. |
| frida_inject_libraryC | Inject a shared library (.so/.dll/.dylib) into the target process. |
| frida_enable_spawn_gatingC | Enable spawn gating to intercept new processes before they run. |
| frida_disable_spawn_gatingC | Disable spawn gating. |
| frida_get_pending_spawnC | Get list of processes waiting in spawn gate. |
| frida_get_process_infoC | Get detailed info about the attached process (arch, platform, threads, etc.). |
| frida_search_stringsC | Search for strings in process memory. |
| frida_compile_agentB | Compile a Frida agent (JavaScript/TypeScript) using frida-compile. Useful for complex agents with dependencies. |
| frida_apk_inspectC | Inspect an Android APK file using frida-apk. |
| frida_memory_allocC | Allocate memory in the target process. Returns the address of allocated memory. |
| frida_memory_protectC | Change memory protection/permissions for a memory region. |
| frida_enumerate_rangesC | Enumerate memory ranges/maps in the process with their protections. |
| frida_enumerate_threadsC | List all threads in the process with their state and context. |
| frida_backtraceC | Get stack backtrace for a thread. Useful for debugging and analysis. |
| frida_debug_symbolC | Resolve debug symbol information from an address or find address from symbol name. |
| frida_list_symbolsC | List debug symbols from a module. |
| frida_native_functionC | Call a native function directly by address or name. Specify return type and argument types. |
| frida_cmoduleC | Compile and load inline C code for high-performance hooks. Returns symbols exported by the C code. |
| frida_objc_call_methodC | Call an Objective-C method on a class or instance (iOS/macOS). |
| frida_java_load_dexC | Load a DEX file dynamically into the Android runtime. |
| frida_socket_connectC | Create a socket connection from within the target process. |
Prompts
Interactive templates invoked by user choice
| Name | Description |
|---|---|
No prompts | |
Resources
Contextual data attached and managed by the client
| Name | Description |
|---|---|
No resources | |
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/dryfryce/frida-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server