OkHTTP
1 | 15K
Uploaded by: @ninjadiary
Secret diary of ninja's OkHTTP General Hooks
Secret diary of ninja's OkHTTP General Hooks
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
iOS SSL Bypass
Nice to use this script
Solution to FridaLab Android application
Root detection phBank | showLoginPage() in checkifDeviceRooted()
Logging tool that send Frida log to Mac NSLoggerViewer
Bypass USB Debugging checks
VerseSploit Hacking Tool v2
iOS Proxy detection & sslpinning bypass
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
iOS application using WrapperUtil
Get permissions dynamically
Use this script to print out the trace for any methods calling Random instead of SecureRandom.
TLS/SSL pinning bypass for iOS 13
A Frida script to bypass SSL certificate pinning in Flutter-based Android applications. Works by patching the native SSL verification function and hooking Java SSL classes.