Anti Frida Bypass
1 | 1K
Uploaded by: @kushjasrapuria
Bypass frida detection
Bypass frida detection
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Keep an eye on newly created objects in GNOME applications
iOS SSH diagnostics
Frida script that disables IOSSecuritySuite protections. Hooks Swift checks like jailbreak, debugger, emulator, proxy, and reverse-engineering detection, forcing safe results.
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
You'll be able to proxy ONLY desired application HTTP traffic
Keep MobileSubstrate from injecting an iOS app (to be used with -f to take advantage of early instrumentation)
Rebase of an existing script. Created for personal use.
TLS/SSL pinning bypass for iOS 13
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
This script monitors Android implicit intents. For use in testing "MASTG-TEST-0026: Testing Implicit Intents"
Universal Robust Advanced Root SSL Pinning Bypass this script cover most advance plus all possible test cases for root detection and ssl pinning bypass.
Logging tool that send Frida log to Mac NSLoggerViewer
Full-featured ObjC and Module tracer for iOS.