stringcompare
1 | 8K
Uploaded by: @dzonerzy
Check for interesting string comparison
Check for interesting string comparison
Nice to use this script
Combination of fridaantiroot and universal android ssl pinning bypass 2
Dumps the Tls profile for android apps via libssl.so
跟踪App的越狱检测逻辑: trace app behaviour of jailbreak detecting
This comprehensive Frida script bypasses over 30 different SSL pinning implementations, ranging from standard Java/Kotlin libraries (OkHttp, TrustKit) to native Flutter certificate verification. It works by forcing a "trust-all" state across nearly all modern Android networking stacks to allow seamless HTTPS traffic interception.
Logs full request and response details (headers, body, status) for network calls made via Alamofire's SessionDelegate. (iOS)
Bypasses jailbreak detection in any "React-Native" app that relies on the 'jail-monkey' library for it's jailbreak detection.
Modify iOS function's implementation
A Frida-based script to bypass SSL pinning in Android applications during security assessments. Built to handle real-world implementations across framework, library, and custom trust validation layers.
get child's process id of fork
expose all WebView input fields
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY
This script will perform to bypass most of the restriction like root, integrity checks. Kindly replace the app package name and use deepseek ai.
Monitors Android deeplink activity and WebView JavaScript interfaces (JSI) using Frida. Tracks Intent data, JavaScript interface usage, and WebView.evaluateJavascript execution.
Enable debugging option of webview for android applications to use the browser developer tools such as debugguer, console, network monitor. This script is useful when you need to set breakpoints and inspect the flow of an application.