Beerus Framework, developed by the Hakai Offensive Security Research Team, is an Android mobile penetration testing project that supports the entire testing process, offering powerful utilities from sandbox exfiltration proofs of concept to full on-device application instrumentation and management, all without needing a computer.
🧐 About
Beerus Framework is a powerful and modular toolkit designed to support every stage of the mobile penetration testing lifecycle. It empowers pentesters with flexibility and efficiency, offering a rich set of features such as:
- Frida Server – Simplifies the setup of Frida Server.
- Frida Core Instrumentation – Built-in instrumentation directly on the device.
- Sandbox & APK Exfiltration – Extract sensitive data and app binaries from protected directories.
- Memory Dumping – Capture in-memory secrets and runtime objects.
- ADB over Network – Connect to ADB wirelessly, no USB cable required.
- Global Proxy Profiles – Enable system-wide proxying for intercepting traffic.
- Magisk Module Manager – Manage Magisk modules with ease.
- Boot Options – Automatically start Frida Server, ADB, and more on boot.
- System Certificate Promotion – Convert user-installed CAs into trusted system certificates for MITM testing.
- Property Changes – Modify Android system properties for testing and bypass scenarios.
- Manifest Decoding – Quickly extract and analyze key elements from Android application manifests.
Learn more in our Blog Post.
To build the project, you need Android Studio with both the SDK and NDK installed.
During the build process, Gradle compiles one native binary:
- Frida Core
This binary is zipped and included in the APK’s assets along with the Beerus Magisk Module.
The official Beerus Framework builds are available exclusively on GitHub.
Click below to download the latest Beerus APK:
To get started:
- Install the APK on your rooted device.
- For full functionality, we recommend Magisk to enable features like:
- Frida Core Instrumentation
- Magisk Module Management
- Property Changes
- Boot Options
- On first run, Beerus will prompt you to install its Magisk Module.
- Frida Core – Instrumentation built-in on device
- Magisk – For enabling advanced features
- Frida – Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
- Frida Core – Core library for building Frida-based tools and instrumentation.
- Fridump – Dump memory and loaded modules from Android apps using Frida.
- Wireless ADB: ADB over TCP/IP – Connect to Android devices via Wi-Fi for debugging and testing.
- Magisk – Suite of open source tools for customizing Android, enabling root access and more.
- Always Trust User Certs – Promote user-installed certificates to the system store.
- Magisk Frida – Automatically starts Frida Server on boot using Magisk.
- JADX – Dex to Java decompiler for Android applications.
- Metasploit – Penetration testing framework for developing and executing exploit code.