ios-backtrace-http-req
1 | 4K
Uploaded by: @SYM01
Backtrace HTTP request.
Backtrace HTTP request.
iOS SSL Bypass
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Dumps the Tls profile for android apps via libssl.so
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Secret diary of ninja's OkHTTP General Hooks
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Frida script to modify the iOS Keychain values which are getting updated on runtime
Bypass frida detection
Use this script to print out the trace for any methods calling Random instead of SecureRandom.
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
Advanced root detection bypass (under dev and testted on Frida 17.2.6)
Logging tool that send Frida log to Mac NSLoggerViewer
Bay pat Facebook