iOS Location Spoofing
1 | 2K
Uploaded by: @securitytest3r
Spoof location in iOS application
Spoof location in iOS application
drfdddddddgdgdg
The secret diary of ninja's scripts about general Crypto Hooks
Disable pinning by patching SecTrustEvaluate
Functions and classes that help you in hooking some Swift functions
teste
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
Flutter, OkHTTPv3, HttpsURLConnection, TrustKit universal SSL unpinner for Android.
Print all SQL queries executed from android sqlite, and sqlcipher
Root
FridaSwiftDump a Frida tool for retriving the Swift Object info from an running app.
Script for geoposition and motion sensor activity forgery for pacer app
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
Android Root-detection Bypass
Dynamically tracing Java function calls within a given package
Hooks libboringssl.dylib to extract TLS keys and enables decryption of network traffic from iOS apps to be decrypted. Tested on iPhone 5s running iOS 12.4.2 jailbroken with Checkrain.