ios-ssl-key-steal2
0 | 770
Uploaded by: @atuncer
2
2
When calculating prices for services, evaluations are made between the sales team and the technical team regarding the time required to complete the target mobile application. However, certain mobile applications, due to their structure, may extend the security testing process. For example, static security tests for a Flutter application with an enabled SSL module and a Cordova application without a client security module may require different working hours. In such cases, it would be useful to quickly detect which framework(s) the target application uses. To facilitate this, I developed a simple script with Frida that identifies the frameworks used by the target mobile application. In the future, I will also work on development for iOS.
sslpinning
changed offsed based on comments
okhttp-log-root
6
Observe PIDs interacting with a given target process' UNIX sockets on i/macOS
Instagram SSL Pinning Bypass script for v397
aer
s
Hide Root Detection From Various Apps
Syscall tracing & args/flags/error/signal parsing with strace-like output for Android x64 (tested with emulator & Android 13). See more at https://github.com/FrenchYeti/interruptor
testing bug
asdfsadf
test2
iOS Jailbreak Detection Bypass