frida-android-unpinning-ssl
8 | 66K
Uploaded by: @masbog
bypass mostly common android ssl pinning method
bypass mostly common android ssl pinning method
Observe file system accesses by hooking some java.io.File* classes and methods, libc open/read functions and try to resolve associtation between file descriptor and path. Optionally, it can dumps the data.
Frida script to perform static security analysis of an iOS app. Works on both Objective-C and Swift based iOS apps.
iOS Jailbreak Detection Bypass tested on iOS 13
Another universal ssl certificate pinning bypass script for Android (https://gist.github.com/akabe1/ac6029bf2315c6d95ff2ad00fb7be1fc)
Bypass certificate pinning on a Flutter-based iOS app
[Android] Create Alert Dialog In MainActivity
Hook all the methods of all the classes owned by the iOS app
有用的函数:包括模拟点击,keychain数据查看,界面结构分析,获取OC类信息等 several useful iOS utils,including keychain dumper, view dumper, perform click
Dumps bytes of DEX provided to InMemoryDexClassLoader on Android
Sockets general hooking
Dumping URI data from a deep link
Dump useful information for an iOS app
[Android] Dynamic Hooks (Creating Function Hooks Was Never Easier)
Bypasses debugging mode checks when USB Debugging mode is activated
Check for native library calls and return a stacktrace