dsa
0 | 74
Uploaded by: @komoosdosk
sda
sda
oh kcuf
This script monitors Android implicit intents. For use in testing "MASTG-TEST-0026: Testing Implicit Intents"
Android SSL Pinning is a Frida script powerful tool for bypassing SSL pinning in Android applications. It use the Frida framework to intercept and patch SSL pinning methods, enabling the analysis of encrypted network traffic.
Bypass the "Installed from Play Store" check
fer
ssl
root and sslpinning
Hook mouseDown on all classes inheriting NSResponder. Then whenever you click on a window or view in an application Frida will log out information on the class so you know what to further inspect or hook.
2
Rebase of an existing script. Created for personal use.
test
Bypass SSL certificate validation for the injected app on iOS 12
s
How it works: - It registers a new WebAppInterface class, which contains the functions to be exported (example showToast) - It then hooks the Activity to obtain a valid context - It then hooks the WebView.loadUrl method, to add a context specific WebAppInterface instance - Lastly, it overrides the annotation checks and instructs that all requested methods are allowed to be requested.
Secret Diary of Ninja's Scripts on permissions general hooking