Log4jFrida
1 | 4K
Uploaded by: @Ch0pin
Change various Android Device Characteristics in order to return a Log4J payload
Change various Android Device Characteristics in order to return a Log4J payload
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
Look up the location of an iOS app on the device using the name displayed under the icon.
The secret diary of ninja scripts' regarding TextView General Hooking
Trace invocations of the RegisterNatives JNI API, to identify native functions registered from within native code on runtime
Disables jailbreak detection in the Vipps app
Bypass SSL certificate pinning for okhttp3
Frida Bluetooth onCharacteristicWrite onCharacteristicChanged
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
Script written in JavaScript to perform Android Log function hooks in search of sensitive information.
Display some info about hashing routine called on Android application
TCP Dump iOS 14
Functions and classes that help you in hooking some Swift functions
Flutter, OkHTTPv3, HttpsURLConnection, TrustKit universal SSL unpinner for Android.
check some permissions
Bypass some functions of the Gantix Jail Monkey package