iOS Jailbreak Detection Bypass
1 | 1K
Uploaded by: @patali09
This script helps to bypass the iOS jailbreak detection. This project is forked from /@DevTraleski/ios-jailbreak-detection-bypass-palera1n/
This script helps to bypass the iOS jailbreak detection. This project is forked from /@DevTraleski/ios-jailbreak-detection-bypass-palera1n/
Get permissions dynamically
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
frida script for bypassing root detection implemented with rootbeer library - https://github.com/scottyab/rootbeer
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Solution to FridaLab Android application
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY
A Frida script to bypass SSL certificate pinning in Flutter-based Android applications. Works by patching the native SSL verification function and hooking Java SSL classes.
Backtrace HTTP request.
Bypass Facebook SSL pinning on Android devices.
This script monitors Android implicit intents. For use in testing "MASTG-TEST-0026: Testing Implicit Intents"
Collection of functions to enumerate Java classes and methods on Android.
Keep MobileSubstrate from injecting an iOS app (to be used with -f to take advantage of early instrumentation)
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Secret diary of ninja's OkHTTP General Hooks