Fridalab single script
0 | 1K
Uploaded by: @Linuxinet
Fridalab Link: https://rossmarks.uk/blog/fridalab/
Fridalab Link: https://rossmarks.uk/blog/fridalab/
AndroidSSLBypass
Hook the BCryptDecrypt() function of the windows bcrypt.dll in order to extract decrypted contents during runtime of the hooked program.
This is a first test application project.
A PoC Frida script for tracing the android SSL exception constructors. Helps a lot with searching the code tree for the certificate pinning functions and exception sources.
script test
2
a
httprect
Monitor and log all interactions with the iOS Keychain by hooking key Security framework APIs: SecItemAdd, SecItemCopyMatching, SecItemUpdate, and SecItemDelete. These APIs are responsible for adding, retrieving, updating, and removing sensitive data (such as passwords, tokens, or cryptographic keys) stored in the Keychain.
Universal Root Detection and SSL Pinning Bypass
byass
Intercepts OkHttp3 requests redirects them to tls.peet.ws and prints the response.
test3
This script hooks into a function called IsDrived() which contains several private function.
ok