Frida Traffic Interceptor
1 | 9K
Uploaded by: @Linuxinet
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Bypass frida detection
Backtrace HTTP request.
Code to enable Web View debugging in Hybrid apps. Buy me a coffee: https://www.buymeacoffee.com/raphaelQ
Bypass Facebook SSL pinning on Android devices.
Frida script to modify the iOS Keychain values which are getting updated on runtime
iOS SSL Bypass
Bypass frida detection
Dumps the Tls profile for android apps via libssl.so
The secret diary of ninja scripts' regarding TextView General Hooking
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
bypass SSL Pinning TIKTOK
TLS/SSL pinning bypass for iOS 13
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause