Skip to main content
Glama

interceptor_frida_detach

Detach Frida sessions from Android apps to remove injected scripts and restore original app behavior during network traffic analysis.

Instructions

Detach Frida session from an Android app, removing injected scripts.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
target_idYesTarget ID from interceptor_frida_attach

Implementation Reference

  • The tool 'interceptor_frida_detach' is registered and implemented within the server.tool block in src/tools/interceptors.ts. It calls interceptorManager.deactivate to detach the Frida session.
    server.tool(
      "interceptor_frida_detach",
      "Detach Frida session from an Android app, removing injected scripts.",
      {
        target_id: z.string().describe("Target ID from interceptor_frida_attach"),
      },
      async ({ target_id }) => {
        try {
          await interceptorManager.deactivate("android-frida", target_id);
          return {
            content: [{
              type: "text",
              text: JSON.stringify({ status: "success", message: `Frida session ${target_id} detached.` }),
            }],
          };
        } catch (e) {
          return { content: [{ type: "text", text: JSON.stringify({ status: "error", error: errorToString(e) }) }] };
        }
      },
Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/yfe404/proxy-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server