Android Hook Notification Builder
0 | 1K
This is used for testing "MASTG-TEST-0005: Determining Whether Sensitive Data Is Shared with Third Parties via Notifications"
This is used for testing "MASTG-TEST-0005: Determining Whether Sensitive Data Is Shared with Third Parties via Notifications"
Loads multiple Frida CodeShare scripts in one shot.
Lists all installed iOS apps by name.
This script monitors Android implicit intents. For use in testing "MASTG-TEST-0026: Testing Implicit Intents"
Cross-platform Frida CodeShare script loader.
test
This dumps encryption ciphers for testing MASTG-TEST-0061: Verifying the Configuration of Cryptographic Standard Algorithms
Prints a list of all installed iOS apps.
Combines root and debugger bypasses in one script.
Analyze the security of iOS encryption and hashing operations. Run the script, use the application normally, then enter 'summary()' to print a security analysis.
You can use this script to check if fields where sensitive information is entered are allowed to cache input. As information is entered, monitor the script output. You must attach this script after changing screens, but only when there is a text field where sensitive data may be entered. Inspired by and heavily modified version of @ay-kay/ios-keyboard-cache/
Inspect WebView-related functions such as loadUrl(), shouldOverrideUrlLoading(), or onPageFinished(). For testing "MASTG-TEST-0027: Testing for URL Loading in WebViews"
Use this script when you notice that your Frida script crashes the iOS app process after 10 seconds. It will disable the iOS watchdog to allow your Frida script to continue loading. Use "SpringBoard" as your Frida target.
This script traces functions typically related to vm and root detection to find what you need to hook to bypass root detection.
Bypass iOS jailbreak detection
This is used for testing "MASTG-TEST-0013/14/15/16: Testing Cryptography"