Instagram SSL Pinning Bypass v399
0 | 542
Uploaded by: @takaotr
Instagram SSL Pinning Bypass script for v399
Instagram SSL Pinning Bypass script for v399
You can use this script to check if fields where sensitive information is entered are allowed to cache input. As information is entered, monitor the script output. You must attach this script after changing screens, but only when there is a text field where sensitive data may be entered. Inspired by and heavily modified version of @ay-kay/ios-keyboard-cache/
Combines root and debugger bypasses in one script.
Collection of functions to enumerate ObjC classes and methods on iOS (Frida 17 API).
y5er
killSSL for FB
This is solution script for FridaLab Challenge(https://rossmarks.uk/blog/fridalab/).
cre: https://github.com/Eltion
Swift StringI nterceptor
ok
Android SSL Pinning bypass
This project hooks common SSL libraries on Android to intercept TLS functions. By attaching to the SSL_CTX_new function and installing the SSL_CTX_set_keylog_callback on exit, it prints SSL/TLS session keys in the standard SSLKEYLOG format to the terminal. This allows users to capture the keys needed to decrypt TLS traffic (e.g., from pcap files) with tools that support the SSLKEYLOG format.
This script hooks into a function called IsDrived() which contains several private function.
test3
wait native library is loaded, so frida will hook after native library successfully loaded by app
sdsdc