Log4jFrida
1 | 3K
Uploaded by: @Ch0pin
Change various Android Device Characteristics in order to return a Log4J payload
Change various Android Device Characteristics in order to return a Log4J payload
Hooks libboringssl.dylib to extract TLS keys and enables decryption of network traffic from iOS apps to be decrypted. Tested on iPhone 5s running iOS 12.4.2 jailbroken with Checkrain.
dump Objective C classes hierarchy
Keep an eye on newly created objects in GNOME applications
Script to instantly display current tab URL on Chrome Android (Suitable for fast URL capturing). Buy me a coffee: https://www.buymeacoffee.com/raphaelQ
Look up the location of an iOS app on the device using the name displayed under the icon.
Android Root-detection Bypass
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
The secret diary of ninja scripts' regarding TextView General Hooking
Trace invocations of the RegisterNatives JNI API, to identify native functions registered from within native code on runtime
Disables jailbreak detection in the Vipps app
Print all SQL queries executed from android sqlite, and sqlcipher
Bypass SSL certificate pinning for okhttp3
Frida Bluetooth onCharacteristicWrite onCharacteristicChanged
Script written in JavaScript to perform Android Log function hooks in search of sensitive information.
Flutter, OkHTTPv3, HttpsURLConnection, TrustKit universal SSL unpinner for Android.