Frinja - SharedPreferences
0 | 8K
Uploaded by: @ninjadiary
The secret diary of ninja's frida scripts about SharedPreferences General Hooking
The secret diary of ninja's frida scripts about SharedPreferences General Hooking
Frida script that bypasses FreeRASP security framework by hooking and nullifying the talsecStart method to disable runtime application self-protection (RASP) checks.
Updated Android biometric bypass script (from Kamil Breński, Krzysztof Pranczk and Mateusz Fruba, August 2019) - This script will bypass authentication when the crypto object is not used. The authentication implementation relies on the callback onAuthenticationSucceded being called. The code resolves BiometricPrompt$AuthenticationResult constructor args at runtime. It should work with any Android version. https://github.com/ax/android-fingerprint-bypass
Intercepts OkHttp3 requests redirects them to tls.peet.ws and prints the response.
A Frida script that hijacks -[CLLocation coordinate] and returns spoofed GPS coordinates. It exposes simple movement helpers (right, left, up, down) that move the spoofed position by a configurable distance (default 50 m) and re-install the spoofed coordinate.
Enumerate code execution in app
Hook a C function and print out the params
hopefully works haha
open wechat xlog, so we can see logs in logcat
test1
hook Java.util.Map
dirty okhttp log
1
Teste
Get the constructors, fields, methods and overloads in a summarised way to quickly explore a class
test