The phone is the pentest platform.
Mobile pentesters context-switch between a phone and a laptop full of disconnected tools — Burp, Frida CLI, jadx, a dozen terminal tabs. The intelligence lives everywhere except the device under test.
RedOps Mobile inverts that. A native Kotlin/Compose UI on the device welds to a Kali NetHunter chroot underneath — Frida, pq, JADX, radare2, and a Claude-powered agent all running locally, all driven from the same app. Decompile, scan, capture traffic, instrument with hooks, and write up findings without tethering anywhere.
ANDROID HOST (phone) NETHUNTER CHROOT (Kali ARM64)
/data/local/nhsystem/kali-arm64
RedOps APK (Kotlin/Compose)
├─ PqCommandExecutor ──── su/chroot/entry ──> /root/pentest/scripts/pq
├─ ClaudeBridge ─────── su/chroot/entry ──> claude CLI (stream-json)
├─ ClaudeMdManager ──── deploys assets ──> /root/pentest/*
│
│ /data/local/tmp/
│ └─ pq_wrapper.sh ──── setsid+chroot ──> android-entry → pq
│
│ /data/local/.cache/
│ └─ media_session_d ← Frida server /usr/local/bin/
(stealth-named) └─ android-entry
What it does in the wild.
Three case studies driven end-to-end with RedOps Mobile — two critical engagement findings and an offensive capability demonstration on a public mobile game.
01 / 03
Critical · Full RCE
301K users + $45K in funds compromised
›
One unauthenticated GET → 301K-user database → webshell → full host compromise.
- Credentials pulled from the APK via RedOps' SharedPreferences module
- Reused on an unauthenticated
Spring Boot Adminconsole GET /actuator/heapdump→ 260 MB of cleartext heap- MySQL, Redis, and Nacos passwords inside the heap — 301K user records and $45K in available funds fully exposed
- Redis
CONFIG SET dir /www/wwwroot+dbfilename shell.php+SAVE - PHP webshell written into the BT Panel webroot → full host RCE
Credential extraction, chain reproduction, and writeup all driven from the phone. No laptop on engagement.
02 / 03
CVSS 9.8 · Zero-click
34M+ MAU Flutter game takeover
›
Zero-click, persistent account takeover across a 34M-MAU Flutter game.
- Traffic hooked with the RedOps CDP bridge (
pq attach --mitm) - VPS reverse-proxied legitimate game assets while injecting malicious JS inline
- Plugin-bridge Frida hooks intercepted every auth flow in real time
- Exfiltrated Facebook OAuth tokens, Google auth codes, session JWTs, device IDs on every launch
- Stolen Facebook token queried the Graph API directly from the in-app V8 context
- Chained as the delivery vector for a second, persistent code-injection path
Flutter nav discovery, V8 hooking, and live traffic interception orchestrated from the phone. App behavior stayed normal to the victim.
03 / 03
Research · Client bypass
Full bypass on a live Unity mobile game
›
Every monetization mechanic on a live Unity mobile game bypassed with one runtime Frida hook.
- APK pulled via ADB and decompiled through the RedOps IL2CPP Dumper integration
- Game-economy methods identified across planet unlocks, rover rewards, credit factory, and manager quality
- Single Frida hook authored to patch each target method at runtime
- In-game overlay UI injected to expose the full cheat menu (Free Planets, Instant Probes, 100% Rover Win, 5☆ Managers, Free Station, Prestige surge DB)
- Loaded via
pq attach— no APK repackaging, no Play Protect triggers - Every bypass toggled live during gameplay with zero client-side detection
End-to-end offensive workflow — static analysis, method identification, hook authoring, live overlay injection — driven entirely from the phone.
Pick Your Target
Every installed app on the device, listed with real icons and package names. Search, filter system apps, then tap to begin analysis. Everything starts here.
Target Intelligence
Automated application reconnaissance. Framework detection, multi-engine decompilation, RCE vector scanning across the full decompiled source, component enumeration, and data extraction — in one tap.
Security Analysis
Manifest inspection, exported component enumeration, and vulnerability classification. Findings are filterable by severity and actionable — send directly to the AI agent.
RedOps Agent
Every target overview is auto-loaded into a pentest-tuned Claude session. Custom discovery and reporting skills, plus an MCP server that exposes Frida, traffic capture, and pq as callable tools — with a Chrome DevTools Protocol bridge on top for web app pentesting. Chains vulnerabilities, writes exploits, documents attack paths autonomously. Both writeups in Proof above came out of sessions just like this one.
The Toolkit
Five integrated instruments for mobile security assessment. IPC monitoring, data extraction, Frida management, traffic interception, and HTTP replay.
Traffic Interception
Frida-based MITM capture with SSL bypass. Intercept every HTTP/HTTPS request, inspect headers, parameters, and response bodies in real time.
HTTP Repeater
Edit captured requests and replay them. Modify parameters, headers, request body. Inspect responses with full JSON formatting.
Dynamic Instrumentation
Stealth Frida server management, hook orchestration, and one-tap script deployment. Organize your arsenal of Frida hooks and shell scripts as favorites.
Data Extraction
Scan SharedPreferences across every installed app. Read, modify, and export preference entries. Automatic security analysis flags sensitive keys and plaintext credentials.
Flutter Instrumentation
Blutter decompilation auto-generates flutter_blutter.js — a combined script that merges extracted class data with flutter_ctrl.js, a universal Flutter instrumentation framework. It appears as a launchable card in the target overview. The framework provides route discovery with a live overlay, platform channel interception and sniffing, Dart heap reading, multi-engine support, native offset hooking, forced navigation to hidden screens, and a full interactive API via pq gate send. Works on any Flutter app with zero app-specific code.
From Scan to Report
A redacted penetration testing report from a real engagement. 10 findings across 5 critical, 2 high, 1 medium — unauthenticated Spring Boot Admin access, Redis RCE via CONFIG SET, 301k user database enumeration, live Stripe keys with $44k accessible balance, and full infrastructure compromise. Discovered and documented end-to-end using RedOps Mobile.