trace android binder call from binderproxy
1 | 1K
Uploaded by: @dvdface
add trace for binder call from binderproxy, use this feature to figure out which binder interface it calls
add trace for binder call from binderproxy, use this feature to figure out which binder interface it calls
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY
iOS Proxy detection & sslpinning bypass
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Bypass Facebook SSL pinning on Android devices.
Override MacBook charging smartness
Bypass frida detection
iOS SSL Bypass
Trying to bypass the RASP of JailMonkey, XOXO.
Logging tool that send Frida log to Mac NSLoggerViewer
let me know !
TLS/SSL pinning bypass for iOS 13
Backtrace HTTP request.
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Secret diary of ninja's OkHTTP General Hooks
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/