12
0 | 1K
Uploaded by: @Malfarion
12
12
open wechat xlog, so we can see logs in logcat
This script dynamically instruments Android applications using Frida to bypass multiple security layers, including root detection, emulator detection, ADB/debugger checks, and JailMonkey anti-tampering mechanisms.
Combines root and debugger bypasses in one script.
test1
my test project
hook Java.util.Map
Swift 4.0, iOS, AARCH64 -- see https://github.com/maltek/swift-frida/blob/master/examples/no_pinning_alamofire.js
capturing-and-decrypting-https-traffic-from-ios-apps-using-frida
killSSL for FB
dirty okhttp log
Ver dados do dispositivo em tempo de execucao
bypass
1
Dump encrypted main.jsbundle at runtime
Only for Uncrackable L1.