Frida Traffic Interceptor
1 | 10K
Uploaded by: @Linuxinet
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Trying to bypass the RASP of JailMonkey, XOXO.
Bypass Facebook SSL pinning on Android devices.
bypass SSL Pinning TIKTOK
Solution to FridaLab Android application
Backtrace HTTP request.
Collection of functions to enumerate Java classes and methods on Android.
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY
iOS SSL Bypass
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Boilerplate for a CLI tool using frida-python
Spoof location in iOS application
Keep MobileSubstrate from injecting an iOS app (to be used with -f to take advantage of early instrumentation)
You'll be able to proxy ONLY desired application HTTP traffic
Logging tool that send Frida log to Mac NSLoggerViewer