frida VS mockttp

Compare frida vs mockttp and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
frida mockttp
14 18
14,787 737
1.8% 0.5%
9.2 8.1
6 days ago 7 days ago
Meson TypeScript
GNU General Public License v3.0 or later Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

frida

Posts with mentions or reviews of frida. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-09-26.
  • Reversing an Android app API
    2 projects | dev.to | 26 Sep 2023
    Frida, uff this is just AMAZING, yes with uppercase and in bold letters. They also has bindings on different languages that can be found in their github repository. Spoiler alert...the Go binding it's pure shit...really couldn't run it. Use just the default that it's installed with pip install frida-tools.
  • Using LD_PRELOAD to cheat, inject features and investigate programs
    6 projects | news.ycombinator.com | 8 Sep 2023
    A great framework for doing something along those lines is Frida (https://github.com/frida/frida). Works on a bunch of stuff, including Android and iOS. Some global-ish certificate pinning bypasses work through Frida, by patching http libraries to not raise exceptions, accept system certificates, etc and just quietly hum along instead. Certificate unpinning in turn enables network MITM with mitmproxy, which makes it a lot quicker and easier to inspect, block, or modify network traffic.

    Funnily enough, I've seen much stronger obfuscation from reverse engineering from my cheap Tuya IoT devices app than from my bank app.

  • iOS Application Security And Static Analysis
    1 project | /r/u_detoxcybersecurity | 19 Jun 2023
    Install Frida from Github :- https://github.com/frida/frida
  • Have you ever heard of apk.sh? It makes reverse engineering Android apps easier.
    2 projects | /r/netsec | 24 Mar 2023
    // see: https://github.com/frida/frida/issues/382
  • Firefox Android now supports tampermonkey
    11 projects | news.ycombinator.com | 16 Feb 2023
    If anyone needs a "monkey" not for web pages but for any process on your computer system, may I recommend Frida:

    https://frida.re

    https://github.com/frida/frida

    With Frida, you write JavaScript programs and inject them into arbitrary processes, to hook and modify and call whatever you please.

    It gets a lot of use in the reverse engineering and vulnerability research communities, but has broader scope too. For instance, I used it recently to automate the UI of a video production program on Windows, by injecting a thread that sends window messages to the main message loop and hooks into various system dialog functions.

  • [Request] Tweak to Decrypt iPAs on Palera1n!
    2 projects | /r/jailbreak | 5 Feb 2023
  • apk.sh, make reverse engineering Android apps easier!
    4 projects | /r/androiddev | 13 Dec 2022
    var android_log_write = new NativeFunction( Module.getExportByName(null, '__android_log_write'), 'int', ['int', 'pointer', 'pointer'] ); var tag = Memory.allocUtf8String("[frida-sript][ax]"); var work = function() { setTimeout(function() { android_log_write(3, tag, Memory.allocUtf8String("ping @ " + Date.now())); work(); }, 1000); } work(); // console.log does not seems to work. see: https://github.com/frida/frida/issues/382 console.log("console.log"); console.error("console.error"); console.warn("WARN"); android_log_write(3, tag, Memory.allocUtf8String(">--(O.o)-<)");
  • How to use Galaxy Watch 4 on "unsupported" Android devices
    1 project | /r/u_mschuster91 | 17 Apr 2022
    Go to https://github.com/frida/frida/releases and download the latest frida-server--android-arm64.xz. Extract it and run adb push frida-server--android-arm64 /sdcard/frida-server
  • HTTP Toolkit
    24 projects | news.ycombinator.com | 20 Dec 2021
  • Frida 15 Is Out
    1 project | news.ycombinator.com | 17 Jul 2021
    It sounds like a kind of black magic:

    > ...It’s a dynamic code instrumentation toolkit. It lets you inject snippets of JavaScript or your own library into native apps on Windows, macOS, GNU/Linux, iOS, Android, and QNX.

    > ...Frida’s core is written in C and injects QuickJS into the target processes, where your JS gets executed with full access to memory, hooking functions and even calling native functions inside the process.

    > There’s a bi-directional communication channel that is used to talk between your app and the JS running inside the target process.

    Here's a description of the architecture:

    https://frida.re/docs/hacking/

    And the source:

    https://github.com/frida/frida

    ---

    Apparently using "wxWindows Library Licence, Version 3.1":

    > This is essentially the LGPL, with an exception stating that derived works in binary form may be distributed on the user's own terms. This is a solution that satisfies those who wish to produce GPL'ed software using Frida, and also those producing proprietary software.

    https://github.com/frida/frida/blob/master/COPYING

mockttp

Posts with mentions or reviews of mockttp. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-07-23.
  • Client-side proxies – a better way to individualise the Internet? (2000)
    2 projects | news.ycombinator.com | 23 Jul 2023
    Interesting how the world has changed since the 2000s here - nowadays the ecosystem is far better, so it's much easier to set up tools to mess around with this, but the use of HTTPS everywhere makes it more difficult in more advanced cases (e.g. you'll often need to fight certificate configuration in individual clients).

    In part because of that, browser extensions have become the main way to go for this kind of local web modification, but now there's new restrictions slowly coming in there too.

    If you want to mess around with HTTP-level rewriting for yourself though, I maintain a Node.js library for easily writing tiny custom HTTP & HTTPS-intercepting proxies that makes it very easy: https://github.com/httptoolkit/mockttp/. Others have built more specific tooling on top too, like this web page modification proxy: https://github.com/OnkelTem/wmod-proxy

    There's a walkthrough for setting up a quick local proxy & rewriting your own browser traffic here: https://httptoolkit.com/blog/javascript-mitm-proxy-mockttp/

  • Ask HN: Side project of more that $2k monthly revenue what's your project?
    12 projects | news.ycombinator.com | 14 Apr 2023
    > What did the first iteration of this product look like? Was it more or less similar, or substantially different from the spirit of httptoolkit today?

    Technically, the first iteration was https://github.com/httptoolkit/mockttp - an HTTP integration testing library for JS. Not a desktop app at all. I'd originally built that for testing uses, but as it matured I realised that with a UI and automated setup tools it'd be useful as a complete product (but Mockttp still powers all the internals today, and you can use it directly to build your own custom intercepting proxies too).

    For the first real product, the very first public 'launch' was literally a landing page with some demos of the potential UI and a signup form, just to test interest and check it wasn't a terrible idea. The results looked promising, so that was followed a few months later by a very basic but usable free version (entirely read-only, and only supporting Chrome interception) with the freemium features on top appearing a few months after that.

    > How did you go from (some semblance of a product) to first sale? / acquiring first customer?

    Once I announced the paid version (a blog post to my tiny set of newsletter signups, plus a little response on HN/Reddit/Product Hunt etc) I got a handful of paying customers (but certainly less than 10) within 24 hours. Nice but not a meaningful income, and from that wild peak it dropped back down to maybe one new customer per week or so afterwards, so it was quite slow going at the start.

    However, those paying customers (and the mere fact of offering a paid service generally) resulted in _much_ better feedback. Rather than "this is cool" all of a sudden I had real demands for specific features, from people with concrete use cases and money in their hands. The initial paid features were just made up off the top of my head, and honestly didn't create a particularly compelling paid feature set. It's very hard to really know what people will pay for! That feedback was incredibly unbelievably useful to fix that.

    From there, building out the key features people asked for over the following 6 months boosted things very significantly, and started to get things moving for real, and then you get into a virtuous circle, where more users => more feedback => better product => more users => ...

    > did you spend anything on marketing/distribution?

    I tested advertising at a small scale for a few months, but it didn't really work great. I think largely because it's very very freemium - 99% of users pay nothing - so the acquisition cost for a paying user doesn't make sense, and also honestly I don't have much experience with ads and I'm not sure I'm any good at writing them.

    Content marketing meanwhile has worked great, keeps passively returning dividends, and cost nothing. I've tried to fill the blog (https://httptoolkit.com/blog/) exclusively with detailed & high-value original content (detailed breakdowns of a recent HTTP security vulnerability, not "top 10 HTTP libraries for Python") which shares well on social networks for an immediate burst of traffic, and then (in most cases) provides both a long-term SEO boost and constant incoming traffic on related topics that converts into users. That starts slow, but again steadily builds up over years, if you keep working at it. Content marketing + SEO are pretty much the only marketing channels I work on right now.

  • HTTP Toolkit
    24 projects | news.ycombinator.com | 20 Dec 2021
    > why would I prefer this to mitmproxy?

    Compared to mitmproxy, HTTP Toolkit:

    - Has fully automated setup for most browsers, docker containers, Android, all Node.js/Ruby/Python/PHP/Go applications run from intercepted terminal windows, all JVM processes, any Electron apps etc etc. Some of these automated setup steps are very difficult to do manually (e.g. intercepting Android devices, where you can't normally install your own certificates nowadays, or intercepting Node.js, which completely ignores system proxy settings) so this can make a huge difference in non-trivial case.

    - Supports targeted interception (intercept just one app/container/browser window) whilst all mitmproxy's manual setup steps are generally focused on helping you intercept your whole machine at once. Intercepting the whole machine means very noisy interception and means that rewriting traffic interferes with all other usage of your machine. Targeted interception means you can do neat things like run two HTTP Toolkit instances independently at the same time, and means you don't need root privileges or permanent configuration settings.

    - Has generally friendlier UI & UX (imo). For example, mitmproxy uses a unique custom syntax (https://docs.mitmproxy.org/stable/concepts-filters/) of special characters to define matching & rewriting rules, or requires you to write a full python script. HTTP Toolkit lets you click 'new rule' -> 'GET requests' -> 'match regex ' -> 'then reply with ', and then immediately start injecting automated fake responses. From HTTP Toolkit you can then build named groups or these rules, and import & export them (as JSON) to build libraries you can share with your colleagues.

    - Provides lots more background information automatically: e.g. built-in documentation for all standard HTTP headers, body autoformatting for lots more formats, syntax highlighting, code folding, regex searching etc of request & response bodies, plus 'this is how and why this response could be cached' caching explanations, OpenAPI-powered docs for recognized endpoints on 1400+ APIs, etc.

    - Includes advanced features to do things like exporting requests as ready-to-use code for various languages & tools, or automatically testing the performance of different compression algorithms on a given response body.

    - Is more easily scriptable for automation & end-to-end testing, because all the HTTP-handling internals are usable as a standalone open-source JS library: https://github.com/httptoolkit/mockttp

    That said, mitmproxy has been around longer, it's definitely more mature, and it was a big inspiration in many places. It's a great project! It does have some advantages of its own:

    - If you strongly prefer a CLI interface, mitmproxy is very focused on that, and HTTP Toolkit is not. HTTP Toolkit could support that too in theory (the backend & frontend are independent) but it definitely doesn't right now, and it's not high on my todo list (contributions welcome though!)

    - Mitmproxy is primarily scriptable in Python. You can build automation around HTTP Toolkit's internals using mockttp, but that's JS, and it's mostly usable standalone right now, rather than integrated into normal workflows within the app. If you want very complex scripted rules, mitmproxy has a few more options right now, and lets you do things in python instead of JS, which some people will prefer.

    - WebSocket debugging - this is coming for HTTP Toolkit soon, but it's not available today. WebSockets get passed through fine, but they don't appear in the UI, and you can't set up mock rules for them.

    > I'd be interested both in why I'd prefer the open source httptoolkit and pro?

    There's a list of Pro features at https://httptoolkit.tech/pricing/. Note that it's all open source, even the Pro code, everything.

    The general idea is that everything you need to intercept, inspect and manually fiddle with traffic is totally free. Anything optional that most users don't need, but which is helpful for advanced usage or enterprise use cases, requires Pro.

  • HTTP Toolkit for Performance Engineers ⚡
    1 project | dev.to | 3 Sep 2021
    HTTP Toolkit works on Windows, Mac and Linux. Head to https://httptoolkit.tech website and download the relevant package to install it.
  • Hudsucker: A MITM HTTP/S (and websocket) proxy
    2 projects | /r/rust | 1 Sep 2021
    I think MITM should provide a lot of features for that please checkout mock http https://github.com/httptoolkit/mockttp
  • Docker is updating and extending our product subscriptions
    10 projects | news.ycombinator.com | 31 Aug 2021
    Same with Telerik Fiddler recently. Good piece of software for debugging network requests on Windows.

    Was free for as long as I've known it existed. Telerik recently bought by 'Progress' (ironic), software re-written in Electron and now charges a subscription to use it.

    Glad HTTP Toolkit is now available free for most standard tasks - https://httptoolkit.tech/

  • How to get packet from mobile game? (How to hack mobile game?)
    1 project | /r/hacking | 9 Aug 2021
    HTTPToolKit has been my go-to for sniffing out packets from mobile apps in recent months.
  • Mitmproxy 7.0
    5 projects | news.ycombinator.com | 16 Jul 2021
    I'd highly recommend https://httptoolkit.tech/ for that explorative GUI phase. I found it recently and the rule configuration, UI and interception setup is significantly better than Charles/Fiddler/Proxyman.
  • In one click intercept, debug and mock HTTP with HTTP Toolkit
    1 project | news.ycombinator.com | 11 Jul 2021
  • Telerik Fiddler going subscription only
    1 project | /r/dotnet | 29 Jun 2021
    Do they want open source versions to get more popular? Because this is how you do that. HTTP TOOLKIT seems pretty decent, does anyone else have a recommendation?

What are some alternatives?

When comparing frida and mockttp you can also consider the following projects:

objection - 📱 objection - runtime mobile exploration

mockoon - Mockoon is the easiest and quickest way to run mock APIs locally. No remote deployment, no account required, open source.

httptoolkit - HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac :tada: Open an issue here to give feedback or ask for help.

mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

httptoolkit-server - The backend of HTTP Toolkit

Proxyman - Modern. Native. Delightful Web Debugging Proxy for macOS, iOS, and Android ⚡️

Express - Fast, unopinionated, minimalist web framework for node.

frida-ios-hook - A tool that helps you easy trace classes, functions, and modify the return values of methods on iOS platform

wsl-environments

next-page-tester - DEPRECATED - DOM integration testing for Next.js