OkHTTP
1 | 14K
Uploaded by: @ninjadiary
Secret diary of ninja's OkHTTP General Hooks
Secret diary of ninja's OkHTTP General Hooks
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY
iOS Proxy detection & sslpinning bypass
Bypass USB Debugging checks
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Solution to FridaLab Android application
iOS SSL Bypass
This script helps to bypass the iOS jailbreak detection. This project is forked from /@DevTraleski/ios-jailbreak-detection-bypass-palera1n/
Get permissions dynamically
Hooks Play Store installer verification and common Java-based termination paths such as System.exit, Runtime.exit, and Activity.finish to support dynamic instrumentation in protected Android applications.
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
Bypass some functions of the Gantix Jail Monkey package
Get the list of the checked paths during jailbreak detection
block_playstore
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
Disable pinning by patching SecTrustEvaluate