frida-extract-keystore-ios
1 | 1K
Uploaded by: @zitoxxx
Hooks the iOS function 'SecPKCS12Import' to extract and dump the certificate file and its corresponding password
Hooks the iOS function 'SecPKCS12Import' to extract and dump the certificate file and its corresponding password
Replaces CFNetworkCopySystemProxySettings proxy configuration dictionary with the default no-proxy config dictionary while dict elements having correct types.
This Code is running and bypassing latest okhttp3 with obfuscated code.
Swift 4.0, iOS, AARCH64 -- see https://github.com/maltek/swift-frida/blob/master/examples/no_pinning_alamofire.js
Frida script that bypasses Touch ID/Face ID authentication by intercepting LocalAuthentication framework calls and forcing them to return success.
my test project
okhttp3-bypass
This script will perform to bypass most of the restriction like root, integrity checks. Kindly replace the app package name and use deepseek ai.
Multi bypass for android
This script dynamically instruments Android applications using Frida to bypass multiple security layers, including root detection, emulator detection, ADB/debugger checks, and JailMonkey anti-tampering mechanisms.
s
Classloader
test2
Dump Dex From IJIAMI Apps
Description: This Frida script bypasses Google Play protection mechanisms in Android applications, including installer verification, Play Integrity checks, and forced redirection to the Play Store. It prevents application termination by hooking methods such as Activity.finish(), System.exit(), and Process.killProcess(). The script also includes root and emulator detection bypass techniques along with WebView monitoring to support dynamic analysis during mobile application penetration testing. Created by Rohit Sharma | LinkedIn: https://www.linkedin.com/in/r0x5r/
Collection of functions to enumerate ObjC classes and methods on iOS (Frida 17 API).