ios-backtrace-http-req
1 | 4K
Uploaded by: @SYM01
Backtrace HTTP request.
Backtrace HTTP request.
This script helps to bypass the iOS jailbreak detection. This project is forked from /@DevTraleski/ios-jailbreak-detection-bypass-palera1n/
Universal Robust Advanced Root SSL Pinning Bypass this script cover most advance plus all possible test cases for root detection and ssl pinning bypass.
Printing information about CCCrypt calls
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
TLS/SSL pinning bypass for iOS 13
Secret diary of ninja's OkHTTP General Hooks
Just testing
Disable pinning by patching SecTrustEvaluate
列出手机上安装的应用
Bay pat Facebook
This script is for bypassing Wi-fi check on a Flutter based iOS app that uses connectivity_plus plugin
Decrypt AES doFinal
Dumps the Tls profile for android apps via libssl.so