1 | 12K
Enable debugging option of webview for android applications to use the browser developer tools such as debugguer, console, network monitor. This script is useful when you need to set breakpoints and inspect the flow of an application.
1 | 163
Nice to use this script
1 | 12K
Secret diary of ninja's OkHTTP General Hooks
1 | 10K
iOS SSL Bypass
1 | 425
Dumps the Tls profile for android apps via libssl.so
1 | 3K
Monitor SQLite Database Activity in Custom Application and show a Insert and delete queries
1 | 542
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
1 | 1K
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
1 | 27K
TLS/SSL pinning bypass for iOS 13
1 | 2K
This script is for bypassing Wi-fi check on a Flutter based iOS app that uses connectivity_plus plugin
1 | 3K
Uploaded by: @iDone
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
1 | 23K
Disable pinning by patching SecTrustEvaluate
1 | 3K
Logging tool that send Frida log to Mac NSLoggerViewer
1 | 1K
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
1 | 4K
Uploaded by: @SYM01
Backtrace HTTP request.
1 | 353
Bay pat Facebook