1 | 490
Uploaded by: @k19x
Este script Frida intercepta as classes IvParameterSpec e SecretKeySpec em Java para capturar e registrar vetores de inicialização (IV) e chaves secretas usados em operações de criptografia. Ele converte esses valores em strings hexadecimais e os exibe no console, evitando repetições.
1 | 1K
iOS SSH diagnostics
1 | 3K
Keep MobileSubstrate from injecting an iOS app (to be used with -f to take advantage of early instrumentation)
1 | 23K
TLS/SSL pinning bypass for iOS 13
1 | 3K
Android Root-detection Bypass
1 | 2K
bypass SSL Pinning TIKTOK
1 | 4K
Keep an eye on newly created objects in GNOME applications
1 | 883
add trace for binder call from binderproxy, use this feature to figure out which binder interface it calls
1 | 6K
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
1 | 9K
iOS SSL Bypass
1 | 7K
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
1 | 4K
Uploaded by: @SYM01
Backtrace HTTP request.
1 | 7K
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY
1 | 6K
Bypass Facebook SSL pinning on Android devices.
1 | 3K
Override MacBook charging smartness
1 | 469
Show Douyin SimVideo Info