ios-backtrace-http-req
1 | 4K
Uploaded by: @SYM01
Backtrace HTTP request.
Backtrace HTTP request.
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
frida script for bypassing root detection implemented with rootbeer library - https://github.com/scottyab/rootbeer
Disable pinning by patching SecTrustEvaluate
Secret diary of ninja's OkHTTP General Hooks
Bay pat Facebook
Enumerate modules and functions present in a Linux ELF binary.
Decrypt AES doFinal
Spoof location in iOS application
iOS SSL Bypass
This script helps to bypass the iOS jailbreak detection. This project is forked from /@DevTraleski/ios-jailbreak-detection-bypass-palera1n/
Rebase of an existing script. Created for personal use.
Logging tool that send Frida log to Mac NSLoggerViewer