Android Bypass SSL
0 | 269
Uploaded by: @realkerberos1
Android Bypass for various Certificate Pinning methods
Android Bypass for various Certificate Pinning methods
trace every binder calls (in and out) in specific process, with descriptor / transactionName callingUid (optional) logged
Bypass Sslpingning
The secret diary of ninja's frida scripts about SharedPreferences General Hooking
Frida script that bypasses FreeRASP security framework by hooking and nullifying the talsecStart method to disable runtime application self-protection (RASP) checks.
Read std::string for Apple OSes, including iOS, macOS, etc.
Intercepts OkHttp3 requests redirects them to tls.peet.ws and prints the response.
A Frida script that hijacks -[CLLocation coordinate] and returns spoofed GPS coordinates. It exposes simple movement helpers (right, left, up, down) that move the spoofed position by a configurable distance (default 50 m) and re-install the spoofed coordinate.
Enumerate code execution in app
Hook a C function and print out the params
hopefully works haha
open wechat xlog, so we can see logs in logcat
test1
hook Java.util.Map
android flutter bypass for Engine SnapshotHash: fee3de0d0af52c31bb081d4226a13a42
1