CLOSED BETA Launching soon
CLOSED BETA · launching soon

An AI-native workbench for mobile reverse engineering.

Capture HTTPS traffic, decompile APKs, hook the runtime, drive the device — all from your browser. Every tool exposed as MCP, so your agent can drive it the way you do.

DarkRide live capture — phone mirror on the left, streaming traffic table on the right
drives from claude code cursor claude.ai any mcp client
The best parts of
  • charles
  • mitmproxy
  • jadx
  • apktool
  • frida
  • objection
  • appium
All together
darkride

one local web app · one device session · one AI agent

Inspect real device traffic

WireGuard transparent proxy. No phone-side proxy config. Filter, search, save — and hook from automation scripts.

  • WireGuard transparent proxy — no device-side proxy config
  • Per-device TLS profiles including Chrome 120 Android fingerprint
  • Request hooks from automation scripts for real-time interception
  • Save, filter, and search captured traffic
Read about traffic capture →
Live device traffic table next to a phone mirror

Analyse APKs with AI assistance

Decompile APKs, diff versions, search strings, and let the AI agent navigate the code with 40+ real tools. Native, React Native, Hermes, and Flutter supported.

  • Decompilation + structural diffing between versions
  • Full-text search across decompiled source
  • React Native, Hermes, and Flutter bundle analysis
  • AI agent with 40+ tools — read files, search code, write analysis notes
Read about APK analysis →
APK analysis overview screen showing package metadata, file count, frameworks, and libraries

Write automations in TypeScript

Drive real Android devices with a fully typed DeviceAPI. Monaco editor with autocomplete, session history with screenshots and traffic per run. iOS automation is on the roadmap.

  • Full typed DeviceAPI — click, setText, waitFor, screenshot, httpGet, and more
  • Monaco editor with autocomplete and inline docs
  • Rule system for handling unexpected popups (cookie banners, rate prompts)
  • Session history with screenshots and captured traffic per run
Read the automation guide →
TypeScript automation editor showing a real DeviceAPI script

Hook the runtime with Frida

Curated script library, Monaco editor, live device mirror. SSL pinning bypass, root detection bypass, anti-debugging — pre-baked, version-pinned.

  • Categorised script library — pinning, root, integrity, anti-debug, emulator
  • Run alongside automation; share state with traffic capture
  • Monaco editor with autocomplete for the Frida JS surface
  • Live device mirror so you can see hooks fire in real time
Read about Frida integration →
Frida script library, editor, and live device mirror

Drive it from your AI

Every DarkRide capability is exposed as MCP. Your Claude or Cursor agent can capture traffic, decompile APKs, run Frida hooks, and drive the device — directly, in the same session, with shared state.

  • 40+ tools, all MCP — no shims, no glue scripts
  • Drop-in install for Claude Code / Cursor / claude.ai
  • Agent reads APK + traffic + Frida + device state in one context
  • Or use the built-in chat — same tools, different surface
Read about MCP integration →
DarkRide AI chat drawer open over the APK analysis page, showing tool calls

And there's more

Plugins

Extend with new protocols and services. 13 extension points · npm workspaces · hot reload in dev.

AI Native

MCP service built-in. Collaborate with AI in your editor or in the app.

AGPL License

Source open forever. Commercial dual-license available for closed deployments.

Born from production use

DarkRide is the toolkit behind themeparks.wiki — generalised and open-sourced.

themeparks.wiki surfaces live waiting times and schedules by reverse-engineering theme park mobile apps. Over years of that work, a stack of custom proxies, decompilation scripts, and analysis tools grew up around it. DarkRide is that stack — cleaned up, given a UI, and released for everyone else doing similar work.

→ It runs in production today. The repo isn’t a lab project.

Support DarkRide. Get Pro features as they ship.

AI cost dashboard, automation script sync, OWASP scanner, session export. Founders pricing locks in for life.

$99 / year · Stripe · cancel anytime

Subscribe →

Quick install

git clone https://github.com/DarkRideApp/DarkRide.git
cd DarkRide
npm install
npm run dev
  1. Connect device
  2. Authorise
  3. Go!

See the installation guide for platform-specific setup.

Frequently asked

How does the AI / MCP integration work?
Every DarkRide tool — traffic capture, APK analysis, Frida hooks, device control — is exposed as an MCP tool. Your existing AI client (Claude Code, Cursor, claude.ai) can connect over MCP and drive DarkRide directly. See the /vs page and the MCP scene above for what that looks like in practice.
Is this legal?
DarkRide is a security research and automation tool. Only use it on devices you own, apps you have permission to analyse, and APIs you are authorised to access. You are responsible for complying with applicable laws and terms of service.
What devices work?
Works best with rooted Android devices — rooting unlocks the full toolkit (automation, HTTPS traffic capture, APK analysis, Frida). iOS has limited support for traffic capture; device automation is on the roadmap.
Why AGPL-3.0?
AGPL-3.0 ensures that improvements and network-service deployments flow back to the community. If the copyleft licence is incompatible with your use case, a commercial licence is available.
Can I use it commercially?
Yes — either under AGPL-3.0 if you can comply with its terms, or via a commercial dual-licence. See COMMERCIAL.md for details.
How do I get support?
GitHub Issues for bug reports, GitHub Discussions for questions, and sponsorship for supporting continued development.