android-ssl-pinning-bypass
1 | 3K
Uploaded by: @ivan-sincek
Rebase of an existing script. Created for personal use.
Rebase of an existing script. Created for personal use.
Keep MobileSubstrate from injecting an iOS app (to be used with -f to take advantage of early instrumentation)
Keep an eye on newly created objects in GNOME applications
add trace for binder call from binderproxy, use this feature to figure out which binder interface it calls
bypass SSL Pinning TIKTOK
Universal Robust Advanced Root SSL Pinning Bypass this script cover most advance plus all possible test cases for root detection and ssl pinning bypass.
Boilerplate for a CLI tool using frida-python
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY
Root detection bypass for Cyberkatze IRoot https://github.com/WuglyakBolgoink/cordova-plugin-iroot
Trying to bypass the RASP of JailMonkey, XOXO.
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
iOS SSL Bypass
Bypass frida detection
Backtrace HTTP request.
Bypass Facebook SSL pinning on Android devices.