1 | 173
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
1 | 9K
Dynamically tracing Java function calls within a given package
1 | 7K
Bypass Facebook SSL pinning on Android devices.
1 | 2K
bypass SSL Pinning TIKTOK
1 | 3K
Uploaded by: @iDone
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
1 | 3K
Spoof location in iOS application
1 | 8K
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
1 | 3K
Override MacBook charging smartness
1 | 2
Nice to use this script
1 | 8K
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
1 | 4K
Root
1 | 1K
Bypasses jailbreak detection in any "React-Native" app that relies on the 'jail-monkey' library for it's jailbreak detection.
1 | 6K
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
1 | 1K
A Frida script for native networking functions (getaddrinfo, connect, send and recv)
0 | 101
Teste
0 | 1K
s