dnakov/frida-mcp
frida-mcp is hosted online, so all tools can be tested directly either in theInspector tabor in theOnline Client.
If you are the rightful owner of frida-mcp and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
A Model Context Protocol (MCP) implementation for Frida dynamic instrumentation toolkit.
Try frida-mcp with chat:
Tools
Functions exposed to the LLM to take actions
list_processes
List all processes running on the system.
enumerate_processes
List all processes running on the system.
Returns:
A list of process information dictionaries containing:
- pid: Process ID
- name: Process name
enumerate_devices
List all devices connected to the system.
Returns:
A list of device information dictionaries containing:
- id: Device ID
- name: Device name
- type: Device type
get_device
Get a device by its ID.
Args:
device_id: The ID of the device to get
Returns:
Information about the device
get_usb_device
Get the USB device connected to the system.
Returns:
Information about the USB device
get_process_by_name
Find a process by name.
attach_to_process
Attach to a process by ID.
create_simple_hook
Create a simple hook for a process.
spawn_process
Spawn a program.
Args:
program: The program to spawn
args: Optional arguments for the program
device_id: Optional device ID
Returns:
Information about the spawned process
resume_process
Resume a process by ID.
Args:
pid: The ID of the process to resume
device_id: Optional device ID
Returns:
Status information
kill_process
Kill a process by ID.
Args:
pid: The ID of the process to kill
device_id: Optional device ID
Returns:
Status information
create_interactive_session
Create an interactive REPL-like session with a process.
This returns a session ID that can be used with execute_in_session to run commands.
Args:
process_id: The ID of the process to attach to
Returns:
Information about the created session
execute_in_session
Execute JavaScript code in an interactive session.
Args:
session_id: The ID of the session to execute in
javascript_code: The JavaScript code to execute
Returns:
The result of the execution
Prompts
Interactive templates invoked by user choice
analyze_app_prompt
Create a prompt to help analyze an application.
inject_script_prompt
Create a prompt to help inject a script into a process.
analyze_process_prompt
Create a prompt to analyze a process.
Resources
Contextual data attached and managed by the client
get_version
URI: frida://version
MIME: text/plain
Get the Frida version.
get_processes_resource
URI: frida://processes
MIME: text/plain
Get a list of all processes as a readable string.
get_devices_resource
URI: frida://devices
MIME: text/plain
Get a list of all devices as a readable string.
get_example_hook
URI: frida://example/hook
MIME: text/plain
Get an example Frida hook script.