Target Selection
Module Explorer
Enumerate loaded native libraries and modules.
| Module Name | Base Address | Size | Path |
|---|---|---|---|
| Click Refresh to load modules | |||
Method Tracer
Live monitoring of class methods invocation.
Memory Search & Patch
Search for patterns in process memory and live-patch values.
Patch Memory
Infiltrator Dashboard
Data exfiltration: API Keys, Credentials, Clipboard & OTPs.
Advanced Bypass Center
Toggle real-time security bypasses and anti-tampering shields.
Connectivity & Trust
Protection & VM
IAP Payment Simulator
Mock responses from Google Play Billing library to unlock premium features and subscriptions for free.
Hooks: BillingClient.queryPurchases, BillingResult
Stealth & Resilience
Advanced techniques to maintain instrumentation persistence.
Anti-Exit Hook
Prevent app from shutting down when it detects a debugger or root.
Thread Hiding
Cloak Frida's worker threads from enumeration via /proc/self/task.
Integrity Spoof
Bypass Play Integrity and SafetyNet basic checks by spoofing responses.
Live Device Logcat
Real-time system logs filtered for target application.