CLOSED BETA Launching soon
CLOSED BETA · launching soon

An AI-native workbench for mobile reverse engineering.

Capture HTTPS traffic, decompile APKs, hook the runtime, drive the device — all from your browser. Every tool exposed as MCP, so your agent can drive it the way you do.

DarkRide live capture — phone mirror on the left, streaming traffic table on the right
  • HTTPS Capture
  • APK Analysis
  • Remote Device Viewer
darkride

one local web app · one device session

  • Automation Engine
  • Script Injection
  • AI Integration

Inspect real device traffic

WireGuard transparent proxy. No phone-side proxy config. Filter, search, save — and hook from automation scripts.

  • WireGuard transparent proxy — no device-side proxy config
  • Per-device TLS profiles including Chrome 120 Android fingerprint
  • Request hooks from automation scripts for real-time interception
  • Save, filter, and search captured traffic
Live device traffic table next to a phone mirror

Analyse APKs with AI assistance

Decompile APKs, diff versions, search strings, and let the AI agent navigate the code with 40+ real tools. Native, React Native, Hermes, and Flutter supported.

  • Decompilation + structural diffing between versions
  • Full-text search across decompiled source
  • React Native, Hermes, and Flutter bundle analysis
  • AI agent with 40+ tools — read files, search code, write analysis notes
APK analysis overview screen showing package metadata, file count, frameworks, and libraries

Write automations in TypeScript

Drive real Android devices with a fully typed DeviceAPI. Monaco editor with autocomplete, session history with screenshots and traffic per run. iOS automation is on the roadmap.

  • Full typed DeviceAPI — click, setText, waitFor, screenshot, httpGet, and more
  • Monaco editor with autocomplete and inline docs
  • Rule system for handling unexpected popups (cookie banners, rate prompts)
  • Session history with screenshots and captured traffic per run
TypeScript automation editor showing a real DeviceAPI script

Hook the runtime with Frida

Curated script library, Monaco editor, live device mirror. SSL pinning bypass, root detection bypass, anti-debugging — pre-baked, version-pinned.

  • Categorised script library — pinning, root, integrity, anti-debug, emulator
  • Run alongside automation; share state with traffic capture
  • Monaco editor with autocomplete for the Frida JS surface
  • Live device mirror so you can see hooks fire in real time
Frida script library, editor, and live device mirror

Drive it from your AI

Every DarkRide capability is exposed as MCP. Your Claude or Cursor agent can capture traffic, decompile APKs, run Frida hooks, and drive the device — directly, in the same session, with shared state.

  • 40+ tools, all MCP — no shims, no glue scripts
  • Drop-in install for Claude Code / Cursor / claude.ai
  • Agent reads APK + traffic + Frida + device state in one context
  • Or use the built-in chat — same tools, different surface
DarkRide AI chat drawer open over the APK analysis page, showing tool calls

Plugins

Extend DarkRide with plugins. Add new protocols and functionality.

AGPL License

Source open forever. Commercial dual-license available for closed deployments.

Born from production use

DarkRide is the toolkit behind ThemeParks.wiki — generalised and open-sourced.

ThemeParks.wiki has been building reverse-engineering tools for years. Over that time, a stack of custom proxies, decompilation scripts, and analysis tools grew up around it. DarkRide is that stack — cleaned up, given a UI, and released for everyone else doing similar work.

→ It runs in production today. The repo isn’t a lab project.

Quick install

git clone https://github.com/DarkRideApp/DarkRide.git
cd DarkRide
npm install
npm run dev
  1. Connect device
  2. Authorise
  3. Go!

See the installation guide for platform-specific setup.

Frequently asked

How does the AI / MCP integration work?
Every DarkRide tool — traffic capture, APK analysis, Frida hooks, device control — is exposed as an MCP tool. Your existing AI client (Claude Code, Cursor, claude.ai) can connect over MCP and drive DarkRide directly. See the /vs page and the MCP scene above for what that looks like in practice.
Is this legal?
DarkRide is a security research and automation tool. Only use it on devices you own, apps you have permission to analyse, and APIs you are authorised to access. You are responsible for complying with applicable laws and terms of service.
What devices work?
Works best with rooted Android devices — rooting unlocks the full toolkit (automation, HTTPS traffic capture, APK analysis, Frida). iOS has limited support for traffic capture; device automation is on the roadmap.
Why AGPL-3.0?
AGPL-3.0 ensures that improvements and network-service deployments flow back to the community. If the copyleft licence is incompatible with your use case, a commercial licence is available.
Can I use it commercially?
Yes — either under AGPL-3.0 if you can comply with its terms, or via a commercial dual-licence. See COMMERCIAL.md for details.
How do I get support?
GitHub Issues for bug reports, GitHub Discussions for questions, and sponsorship for supporting continued development.