iOS13-pinning-bypass
1 | 28K
Uploaded by: @federicodotta
TLS/SSL pinning bypass for iOS 13
TLS/SSL pinning bypass for iOS 13
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
iOS SSH diagnostics
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Bypass Facebook SSL pinning on Android devices.
Root detection phBank | showLoginPage() in checkifDeviceRooted()
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY
Solution to FridaLab Android application
Simple script to bypass Instagram SSL Pinning, have fun.
Logging tool that send Frida log to Mac NSLoggerViewer
Keep an eye on newly created objects in GNOME applications
iOS application using WrapperUtil
Boilerplate for a CLI tool using frida-python
add trace for binder call from binderproxy, use this feature to figure out which binder interface it calls
Spoof location in iOS application