Search for the string in memory
0 | 695
Uploaded by: @DiegoCaridei
search string in the memory
search string in the memory
1
Bypassing certificate pinning in COSMOTE What's Up 4.7.1 (Android)
Combination of fridaantiroot and universal android ssl pinning bypass 2
Works on any(or almost any) version of IG/FB. Uses memory scan to find actual offsets
test
How It Works: Tracing: This script traces methods commonly involved in handling sensitive data, like retrieving data from SharedPreferences, sending SMS messages, making HTTP requests, and performing cryptographic operations. Stack Tracing: It also prints out stack traces for each call to help identify where in the app the data handling occurs. Logging: The script logs method calls and arguments, which can help identify if any sensitive data is being handled improperly. Usage: Save this script to a file, e.g., trace_sensitive_data.js. Run it with Frida on your target app: frida -U -f com.example.app -l trace_sensitive_data.js --no-pause
tiktok
test
by[ass
Android Java Interceptor is a Frida script intercepts and logs method calls in an Android app. It uses the Frida framework to hook into the target app, capture method invocations, and print information about arguments and return values.
asd
修改地理位置
test
a test
Dump encrypted index.android.bundle at runtime