Frida Traffic Interceptor
1 | 12K
Uploaded by: @Linuxinet
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Keep an eye on newly created objects in GNOME applications
Boilerplate for a CLI tool using frida-python
iOS SSH diagnostics
Frida script that disables IOSSecuritySuite protections. Hooks Swift checks like jailbreak, debugger, emulator, proxy, and reverse-engineering detection, forcing safe results.
Some Frida script that works with Discord good (I will add recv soon!)
You'll be able to proxy ONLY desired application HTTP traffic
Keep MobileSubstrate from injecting an iOS app (to be used with -f to take advantage of early instrumentation)
Bypass frida detection
TLS/SSL pinning bypass for iOS 13
This script monitors Android implicit intents. For use in testing "MASTG-TEST-0026: Testing Implicit Intents"
Logging tool that send Frida log to Mac NSLoggerViewer
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY
Simple script to bypass Instagram SSL Pinning, have fun.
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
iOS Proxy detection & sslpinning bypass