frida-android-unpinning-ssl
7 | 43K
Uploaded by: @masbog
bypass mostly common android ssl pinning method
bypass mostly common android ssl pinning method
iOS Jailbreak Detection Bypass tested on iOS 13
Sockets general hooking
Hook all the methods of all the classes owned by the iOS app
Frida script to perform static security analysis of an iOS app. Works on both Objective-C and Swift based iOS apps.
Bypass certificate pinning on a Flutter-based iOS app
Another universal ssl certificate pinning bypass script for Android (https://gist.github.com/akabe1/ac6029bf2315c6d95ff2ad00fb7be1fc)
Observe file system accesses by hooking some java.io.File* classes and methods, libc open/read functions and try to resolve associtation between file descriptor and path. Optionally, it can dumps the data.
Dump useful information for an iOS app
Check for native library calls and return a stacktrace
[Android] Dynamic Hooks (Creating Function Hooks Was Never Easier)
Bypasses debugging mode checks when USB Debugging mode is activated
Log Android TCP connections (with Java call traces, if applicable)
Dump useful values of CCCrypt function
Check if an iOS app supports the use of custom third-party keyboards.
Frida script for bypassing Wi-Fi check on an Android app that allows only using cellular network.