Fridaantiroot
1 | 3K
Uploaded by: @khoomelvin
Root
Root
iOS SSH diagnostics
Bypass some functions of the Gantix Jail Monkey package
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
Android Root-detection Bypass
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
dump Objective C classes hierarchy
Script to instantly display current tab URL on Chrome Android (Suitable for fast URL capturing). Buy me a coffee: https://www.buymeacoffee.com/raphaelQ
Look up the location of an iOS app on the device using the name displayed under the icon.
Trace invocations of the RegisterNatives JNI API, to identify native functions registered from within native code on runtime
The secret diary of ninja scripts' regarding TextView General Hooking
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
Disables jailbreak detection in the Vipps app
FridaSwiftDump a Frida tool for retriving the Swift Object info from an running app.
Bypass SSL certificate pinning for okhttp3
Frida Bluetooth onCharacteristicWrite onCharacteristicChanged