PowerShell automation script for installing Frida on Windows and pushing Frida server to a connected Android device via ADB.
- Auto-detects architecture and downloads appropriate Frida server
- Allows install, update, or specific version selection for both client and server
- Handles previously installed versions
- Extracts
.xzfiles using 7-Zip - Pushes
frida-serverto/data/local/tmp/on the Android device - Makes server executable and launches it via
adb shell - Modular, well-commented code structure
git clone https://github.com/7absec/Frida-Installer.git
cd Frida-Installer.\Frida_install.ps1Choose from the menu:
[1] Install Frida
[2] Update Frida to latest
[3] Install specific version
You will be prompted to:
- Select Frida client version
- Select Frida server version
It downloads, renames (with version), pushes and starts the server.
- PowerShell (Windows)
- ADB (Android Debug Bridge) in PATH
- Python 3 and pip
- 7-Zip installed and in PATH
Ensure USB debugging is enabled on your Android device and it's connected.
- ❌ “Cannot bind to 127.0.0.1:27042” — likely the Frida server is already running. Kill the process or use
Portfrida.bat. - ❌ “Permission denied” — check device root access and SELinux status.
Use this helper script if the server crashes or port is stuck:
.\CustomFScripts\Portfrida.batIt will:
- Check if port 27042 is in use
- Kill the process if necessary
- Restart the appropriate
frida-server-*binary
To capture and inspect HTTPS traffic from the Android device using Burp Suite, you need to install its CA certificate into the Android system certificate store.
⚠️ This step requires root access on the Android device.
You can find the script here: Pushcrt.py GitHub Repository
Pushcrt.py automates the following:
- Extracts Burp's certificate (
cacert.deror similar) - Converts it to Android-compatible format (
.0hashed name) - Pushes it to
/system/etc/security/cacerts/usingadb rootandremount - Sets correct permissions (
644) - Suggests a reboot
-
Export Burp Suite's certificate in DER format:
- Burp > Proxy > Options > Import / Export CA Cert > Export as DER
-
Run the Python script:
python Pushcrt.py -i cacert.der-i: Path to the input DER certificate
- The script will:
- Convert it using
openssl - Compute certificate hash
- Push and set permissions
- Suggest a reboot if required
- Convert it using
adb(with root access)- Python 3.x
opensslin PATH- Device should have
/systemwritable (useadb remountor Magisk)
[*] Certificate hash: 9a5ba575.0
[*] Pushing cert to /system/etc/security/cacerts/...
[*] Setting permissions...
[✓] Done.- Android 7+ uses certificate pinning, which may require Frida hooks to bypass in many apps.
- This only works for system-level apps to trust Burp. For user apps with pinned certs, refer to Frida TLS unpinning scripts.
You can chain this with Frida_install.ps1 in a single automation pipeline:
.\Frida_install.ps1
python Pushcrt.py -i cacert.derMIT