EngModMobileModMenu
1 | 984
Uploaded by: @Zunzz
Simple mod menu for Android.
Simple mod menu for Android.
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Bypass Facebook SSL pinning on Android devices.
bypass SSL Pinning TIKTOK
Override MacBook charging smartness
Nice to use this script
Solution to FridaLab Android application
Root detection phBank | showLoginPage() in checkifDeviceRooted()
TLS/SSL pinning bypass for iOS 13
Secret diary of ninja's OkHTTP General Hooks
Use this script to print out the trace for any methods calling Random instead of SecureRandom.
Spoof location in iOS application
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Collection of functions to enumerate Java classes and methods on Android.
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY