Facebook SSL Pinning Bypass
1 | 10K
Uploaded by: @Eltion
Bypass Facebook SSL pinning on Android devices.
Bypass Facebook SSL pinning on Android devices.
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Backtrace HTTP request.
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
iOS SSL Bypass
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
bypass SSL Pinning TIKTOK
Printing information about CCCrypt calls
Logging tool that send Frida log to Mac NSLoggerViewer
TLS/SSL pinning bypass for iOS 13
Monitor SQLite Database Activity in Custom Application and show a Insert and delete queries
Just testing
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
Disable pinning by patching SecTrustEvaluate
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Bay pat Facebook