1 | 4K
This comprehensive Frida script bypasses over 30 different SSL pinning implementations, ranging from standard Java/Kotlin libraries (OkHttp, TrustKit) to native Flutter certificate verification. It works by forcing a "trust-all" state across nearly all modern Android networking stacks to allow seamless HTTPS traffic interception.
1 | 1K
android-tcp-trace
1 | 2K
Modify iOS function's implementation
1 | 10K
Solution to FridaLab Android application
1 | 1K
teste
1 | 2K
Uploaded by: @0x79H
check some permissions
1 | 54
A Frida-based script to bypass SSL pinning in Android applications during security assessments. Built to handle real-world implementations across framework, library, and custom trust validation layers.
1 | 8K
Decrypt AES doFinal
1 | 458
Bypass SSL Pinning
1 | 5K
Root
1 | 8K
Check for interesting string comparison
1 | 2K
A Frida script for native networking functions (getaddrinfo, connect, send and recv)
1 | 2K
Bypasses jailbreak detection in any "React-Native" app that relies on the 'jail-monkey' library for it's jailbreak detection.
1 | 388
Nice to use this script
1 | 6K
Uploaded by: @ercu
Combination of fridaantiroot and universal android ssl pinning bypass 2
1 | 789
Logs full request and response details (headers, body, status) for network calls made via Alamofire's SessionDelegate. (iOS)