Fiddler 4 SSL pinning bypass
1 | 8K
Uploaded by: @voltagex
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Functions and classes that help you in hooking some Swift functions
Trace arbitrary function calls in a Linux ELF binary.
Disables jailbreak detection in the Vipps app
Bypass SSL certificate pinning for okhttp3
Backtrace HTTP request.
frida script for bypassing root detection implemented with rootbeer library - https://github.com/scottyab/rootbeer
Printing information about CCCrypt calls
Full-featured Java and Module tracer for Android.
TLS/SSL pinning bypass for iOS 13
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Secret diary of ninja's OkHTTP General Hooks
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
Use this script to print out the trace for any methods calling Random instead of SecureRandom.
Logging tool that send Frida log to Mac NSLoggerViewer