Teste
1 | 1K
Uploaded by: @tomax143
teste
teste
Disable UIWebView's own SSL validation
Universal Robust Advanced Root SSL Pinning Bypass this script cover most advance plus all possible test cases for root detection and ssl pinning bypass.
Printing information about CCCrypt calls
iOS SSL Bypass
Este script Frida intercepta as classes IvParameterSpec e SecretKeySpec em Java para capturar e registrar vetores de inicialização (IV) e chaves secretas usados em operações de criptografia. Ele converte esses valores em strings hexadecimais e os exibe no console, evitando repetições.
Secret diary of ninja's OkHTTP General Hooks
Backtrace HTTP request.
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY
You'll be able to proxy ONLY desired application HTTP traffic
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Some Frida script that works with Discord good (I will add recv soon!)
Keep MobileSubstrate from injecting an iOS app (to be used with -f to take advantage of early instrumentation)
Dumps the Tls profile for android apps via libssl.so
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only