1 | 155
Hooks Play Store installer verification and common Java-based termination paths such as System.exit, Runtime.exit, and Activity.finish to support dynamic instrumentation in protected Android applications.
0 | 357
This Frida script bypasses multiple Android proxy detection techniques and forces application traffic through Burp Suite. Scenario: The target Android application was detecting active proxies and blocking network communication by freezing on the main activity. Although SSL pinning was successfully bypassed, no traffic was visible in Burp Suite. API endpoints were only observable via Frida logs. This script is intended for educational purposes and authorized security testing only.
0 | 2K
This project involved bypassing root detection and SSL pinning in a mobile application. I combined two separate scripts, sourced from GitHub—one for bypassing root detection and the other for bypassing SSL pinning—into a single solution, allowing me to bypass both security mechanisms simultaneously.