ios-backtrace-http-req
1 | 4K
Uploaded by: @SYM01
Backtrace HTTP request.
Backtrace HTTP request.
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Disable pinning by patching SecTrustEvaluate
iOS SSL Bypass
Bay pat Facebook
Frida script to modify the iOS Keychain values which are getting updated on runtime
Decrypt AES doFinal
Dumps the Tls profile for android apps via libssl.so
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Change various Android Device Characteristics in order to return a Log4J payload
Bypass Facebook SSL pinning on Android devices.
Functions and classes that help you in hooking some Swift functions
Full-featured ObjC and Module tracer for iOS.
bypass jailbreak plus ssl check ios 16
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Logging tool that send Frida log to Mac NSLoggerViewer