FridaNSLogger
1 | 3K
Uploaded by: @neil-wu
Logging tool that send Frida log to Mac NSLoggerViewer
Logging tool that send Frida log to Mac NSLoggerViewer
Root
Show all owned classes of the iOS app
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
Hooks libboringssl.dylib to extract TLS keys and enables decryption of network traffic from iOS apps to be decrypted. Tested on iPhone 5s running iOS 12.4.2 jailbroken with Checkrain.
获取设备参数,检测改机工具能力: get device parameter
跟踪App的越狱检测逻辑: trace app behaviour of jailbreak detecting
Enable debugging option of webview for android applications to use the browser developer tools such as debugguer, console, network monitor. This script is useful when you need to set breakpoints and inspect the flow of an application.
Disable UIWebView's own SSL validation
Disable pinning by patching SecTrustEvaluate
Backtrace HTTP request.
Solution to FridaLab Android application
iOS SSL Bypass
See https://github.com/overtake/TelegramSwift/pull/22
dump Objective C classes hierarchy