Projects by popularity

Universal Android Security Bypass Suite UASBS v1 Full Mobile Defense Disabler

0 | 0

Uploaded by: @khaledealrefaee

An advanced Frida-based Android security bypass suite for authorized penetration testing and red teaming engagements. It dynamically detects and disables all major security defenses found in mobile applications, including: • Root Detection (RootBeer, API-based, file-based, system property, etc.) • Emulator Detection (QEMU, LDPlayer, Bluestacks, Nox, etc.) • Debugger Detection (TracerPid, isDebuggerConnected, ADB flags) • Frida Detection (stack traces, process names, TCP ports, etc.) • SSL Pinning (TrustManager, OkHttp, TrustKit, WebView) • Play Integrity / SafetyNet Bypass • VPN & External Storage Detection • Biometric & Screen Lock Checks • Tamper Detection (signature, DEX, package checks) • Firebase, Retrofit, Cronet, and Firestore Communications • RealDevice / DevelopmentMode / System Properties • Dynamic Discovery & Enumeration of suspicious classes/methods Includes dynamic scanning, OPSEC-safe stealth modes, verbose logging, automatic method bypassing, and coverage for both Java and native layers. **Created by:** Khaled Al-Refaee (Ozex) **Version:** 4.0 **Date:** 2025 **Legal Use:** For licensed penetration testing, mobile app red teaming, and professional security research.

AndroidTLSKeylogger

0 | 2K

Uploaded by: @monkeywave

This project hooks common SSL libraries on Android to intercept TLS functions. By attaching to the SSL_CTX_new function and installing the SSL_CTX_set_keylog_callback on exit, it prints SSL/TLS session keys in the standard SSLKEYLOG format to the terminal. This allows users to capture the keys needed to decrypt TLS traffic (e.g., from pcap files) with tools that support the SSLKEYLOG format.

ios-freerasp-bypass

0 | 339

Uploaded by: @0tax00

Frida script that bypasses FreeRASP security framework by hooking and nullifying the talsecStart method to disable runtime application self-protection (RASP) checks.