frida-android-unpinning-ssl
9 | 72K
Uploaded by: @masbog
bypass mostly common android ssl pinning method
bypass mostly common android ssl pinning method
Observe file system accesses by hooking some java.io.File* classes and methods, libc open/read functions and try to resolve associtation between file descriptor and path. Optionally, it can dumps the data.
Trace the JNI API in Android apps.
Bypass certificate pinning on a Flutter-based iOS app
[Android] Create Alert Dialog In MainActivity
Hook all the methods of all the classes owned by the iOS app
Frida script to perform static security analysis of an iOS app. Works on both Objective-C and Swift based iOS apps.
Bypasses debugging mode checks when USB Debugging mode is activated
Another universal ssl certificate pinning bypass script for Android (https://gist.github.com/akabe1/ac6029bf2315c6d95ff2ad00fb7be1fc)
有用的函数:包括模拟点击,keychain数据查看,界面结构分析,获取OC类信息等 several useful iOS utils,including keychain dumper, view dumper, perform click
Jailbreak detection bypass with a wordlist specific to Palera1n jailbreak.
Sockets general hooking
[Android] Dynamic Hooks (Creating Function Hooks Was Never Easier)
Check for native library calls and return a stacktrace
Dumps bytes of DEX provided to InMemoryDexClassLoader on Android
Dumping URI data from a deep link