iOS sqlite3
0 | 78
Uploaded by: @karim-moftah
Hooks sqlite3_prepare, sqlite3_prepare_v2, sqlite3_prepare_v3, sqlite3_prepare16, sqlite3_prepare16_v2, sqlite3_prepare16_v3
Hooks sqlite3_prepare, sqlite3_prepare_v2, sqlite3_prepare_v3, sqlite3_prepare16, sqlite3_prepare16_v2, sqlite3_prepare16_v3
Script to bypass Frida detection
Disable SSL certificate check for iOS app.
objection agents test
e
This Frida script hooks into Appleās CoreLocation framework to simulate a moving GPS location on iOS apps. It intercepts CLLocationManager methods and continuously delivers fake location updates that appear as if the device is walking randomly within a defined area.
1
Latest Scottyab Root bypass
Created for personal use.
Frida
Bypass the commonly used root techniques designed for simple apps, intended for testing purposes. Strong Runtime Application Self-Protection (RASP) will detect this easily.
Dump dynamically created files, note: this require a custom send message handler
Prints a list of all installed iOS apps.
How it works: - It registers a new WebAppInterface class, which contains the functions to be exported (example showToast) - It then hooks the Activity to obtain a valid context - It then hooks the WebView.loadUrl method, to add a context specific WebAppInterface instance - Lastly, it overrides the annotation checks and instructs that all requested methods are allowed to be requested.
tt
Script to observer the Activities stack trace in Runtime.