Android Deep Link Observer
5 | 16K
Uploaded by: @leolashkevych
Dumping URI data from a deep link
Dumping URI data from a deep link
Dump useful values of CCCrypt function
Some Android apps do not allow to run when the developer mode is enabled on the device. This script was written for bypassing developer mode check on an Android app.
Dump useful information for an iOS app
Log Android TCP connections (with Java call traces, if applicable)
Script to disable Flutter TLS verification on Android and iOS. Supports DIO SSL Pinning.
Enable WebView debugging for all iOS apps (Jailbreak required).
This is a simple handler I have created to extract the body and request type (GET/POST) for each request made by the target iOS application. I'm @J_Duffy01 on Twitter if any q's!
Black-box fuzzing of URL schemes for iOS apps using SpringBoard. Automates launching the app via URL, backgrounding, and checking for a crash. Bonus function to dump all registered URL schemes.
Check if an iOS app supports the use of custom third-party keyboards.
Crypto: A Suite of frida scripts regarding cryptography for general penetration testing and research purposes
Spoofs the current location reported by GPS
Strace by Frida: prints system calls (SVC) and parses args/flags/errors. More at https://github.com/FrenchYeti/interruptor
Script for interacting with content providers
Bypass Instagram SSL pinning on Android devices.
Native Interceptor is a Frida script that allows you to intercept and monitor function calls in native libraries and processes. This script provides a wide range of customization options to help you capture and analyze the behavior of specific functions within the target application.