DanielTesting
0 | 438
Uploaded by: @chishunho
DanielTesting
DanielTesting
This project hooks common SSL libraries on Android to intercept TLS functions. By attaching to the SSL_CTX_new function and installing the SSL_CTX_set_keylog_callback on exit, it prints SSL/TLS session keys in the standard SSLKEYLOG format to the terminal. This allows users to capture the keys needed to decrypt TLS traffic (e.g., from pcap files) with tools that support the SSLKEYLOG format.
123
find full class path for Java.use() method. Sometimes its hard byhand)
Tabdool
Bypass Signature Checker of IJIAMI Apps.
Analyze the security of iOS encryption and hashing operations. Run the script, use the application normally, then enter 'summary()' to print a security analysis.
get keys
Find java classes. hook em? destroy em?
5
AndroidSSLBypass
Intercepts OkHttp3 requests redirects them to tls.peet.ws and prints the response.
eee
A script that will extract/intercept private keys from the Android+OpenSSL based binary by hooking the i2d_PrivateKey and PEM_read_bio_PrivateKey functions.
Intercepts OkHttp3 requests and prints the requests.
test project