Skip to content

appknox/knoxspy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

44 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” KnoxSpy

Breaking the Proxy Barrier: Advanced Network Traffic Interception for MDM Applications

A cutting-edge Frida-based tool for bypassing certificate pinning and intercepting network traffic from mobile applications that resist traditional proxy methods.

Platform Frida Language License DEF CON

πŸš€ The Problem

Traditional proxy tools like Burp Suite fail when dealing with:

  • πŸ“± Mobile Device Management (MDM) applications
  • πŸ”’ Certificate pinning implementations
  • πŸ›‘οΈ Custom security protocols
  • πŸ” TLS/SSL bypass restrictions
  • 🌐 Devices using VPN connections

KnoxSpy solves this by hooking directly into popular network libraries at runtime, even when the API traffic is routed through a VPN.


🎯 Key Features

πŸ”₯ Advanced Interception

  • Runtime Hooking: Bypass certificate pinning and security restrictions
  • Multi-Platform: Android (OkHttp3) and iOS (Alamofire/AFNetworking) support
  • Real-Time Analysis: Live traffic capture and analysis

πŸ› οΈ Professional Toolkit

  • Traffic Replay: Replay captured requests for testing
  • Session Management: Multiple concurrent testing sessions

🎨 Modern Interface

  • Vue.js Frontend: Responsive, intuitive web interface
  • WebSocket Integration: Real-time updates and communication

πŸ“Έ Screenshots

Session Management

Session Management

Create and manage multiple testing sessions with different devices and applications

Application Discovery

Application Discovery

Browse and select applications on connected Android and iOS devices

Library Attachment

Library Attachment

Automatically detect and attach to network libraries (OkHttp3 shown)

Traffic Analysis

Traffic Analysis

Capture, analyze, and modify network traffic in real-time


⚑ Quick Start

πŸ”§ Prerequisites

  • Frida Server 16.2.1 installed on target device
  • Node.js 18+ for development
  • Android/iOS device with USB debugging enabled

Note: Android device has to be rooted

πŸš€ Installation

# Clone the repository
git clone https://github.com/appknox/knoxspy.git
cd knoxspy

# Install dependencies
cd app/gui && npm install
cd ../server && npm install
cd ../..

# Start the application
./knoxspy

🎯 Usage

  1. Connect Device: Ensure Frida server is running on your target device
  2. Launch KnoxSpy: Run ./knoxspy to start both frontend and backend
  3. Access Interface: Open http://localhost:5173 in your browser
  4. Create Session: Set up a new testing session
  5. Select App: Choose the target application from the device
  6. Select Library: Choose the library being used by the application
  7. Capture Traffic: Switch to the Proxy tab and start intercepting

πŸ”¬ Technical Deep Dive

πŸ—οΈ Architecture

  • Frontend: Vue.js 3 + TypeScript + PrimeVue
  • Backend: Node.js + Express + WebSocket
  • Database: SQLite for session and library management
  • Instrumentation: Frida + Custom JavaScript/TypeScript agents

🎭 Supported Libraries

Platform Library Coverage
Android OkHttp3 βœ… Full Support
iOS Alamofire βœ… Full Support
iOS AFNetworking βœ… Full Support
Custom User Scripts βœ… Extensible

πŸ”Œ Custom Agent Support

Upload your own Frida agents as ZIP files:

  • Must contain package.json
  • TypeScript source automatically compiled
  • Stored in libraries/ directory
  • Database tracking for metadata

πŸŽͺ DEF CON 31 Highlights

πŸ† Research Impact

  • MDM Security: Exposing hidden vulnerabilities in enterprise applications
  • Mobile Pentesting: New methodologies for bypassing modern security measures
  • Network Analysis: Advanced techniques for traffic interception

πŸ”₯ Live Demo Features

  • Real-time MDM app analysis
  • Certificate pinning bypass demonstrations
  • Custom agent deployment
  • Enterprise application security testing

πŸ›‘οΈ Security & Ethics

βš–οΈ Responsible Use

  • Authorized Testing Only: Use only on applications you own or have permission to test
  • Research Purpose: Designed for defensive security research and penetration testing
  • Compliance: Ensure compliance with local laws and regulations

πŸ”’ Security Features

  • Session Isolation: Each testing session is properly isolated
  • Secure Communication: WebSocket connections with proper validation
  • File Validation: Uploaded agents undergo security checks

🚧 Development

πŸ”¨ Building from Source

# Frontend development
cd app/gui
npm run dev

# Backend development
cd app/server
npm run dev

# Production build
cd app/gui
npm run build

πŸ§ͺ Testing

# Run frontend tests (when available)
cd app/gui
npm run test

# Run backend tests (when available)
cd app/server
npm run test

πŸ“š Documentation

πŸ“– Additional Resources

πŸ”— References


🀝 Contributing

We welcome contributions from the security research community! Feel free to:

  • Report bugs and issues
  • Submit feature requests
  • Contribute code improvements
  • Share your custom Frida agents
  • Improve documentation

🌟 Contributors

  • Security researchers and penetration testers
  • Mobile application developers
  • Network security professionals

πŸ“„ License

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.


🎯 About Appknox

KnoxSpy is developed by Appknox, a leading mobile security company dedicated to making mobile applications more secure through innovative security testing tools and platforms.


Ready to Break the Proxy Barrier?

Star ⭐ this repository if you find it useful!

πŸš€ Get Started β€’ πŸ“Έ View Screenshots β€’ πŸ”¬ Technical Details β€’ πŸ›‘οΈ Security


Made with ❀️ for the security research community

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •