1 | 4K
Uploaded by: @iDone
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
1 | 5K
Uploaded by: @SYM01
Backtrace HTTP request.
1 | 1K
This script helps to bypass the iOS jailbreak detection. This project is forked from /@DevTraleski/ios-jailbreak-detection-bypass-palera1n/
1 | 10K
Universal Robust Advanced Root SSL Pinning Bypass this script cover most advance plus all possible test cases for root detection and ssl pinning bypass.
1 | 27K
Disable pinning by patching SecTrustEvaluate
1 | 13K
iOS SSL Bypass
1 | 659
Bay pat Facebook
1 | 8K
Decrypt AES doFinal
1 | 2K
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
1 | 466
Frida script to bypass Android’s FLAG_SECURE protection, allowing screenshots and screen recording in apps that normally block them. #Android, #Frida, #FLAG_SECURE, #screenshot, #screen_recording, #bypass
1 | 2K
A Frida script to bypass SSL certificate pinning in Flutter-based Android applications. Works by patching the native SSL verification function and hooking Java SSL classes.
1 | 4K
Spoof location in iOS application
1 | 31K
TLS/SSL pinning bypass for iOS 13
1 | 5K
Functions and classes that help you in hooking some Swift functions
1 | 4K
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
1 | 15K
Secret diary of ninja's OkHTTP General Hooks