proxy and sslpinning bypass
0 | 5
Uploaded by: @ahmedMhesham12
iOS Proxy detection & sslpinning bypass
iOS Proxy detection & sslpinning bypass
tiktok
How It Works: Tracing: This script traces methods commonly involved in handling sensitive data, like retrieving data from SharedPreferences, sending SMS messages, making HTTP requests, and performing cryptographic operations. Stack Tracing: It also prints out stack traces for each call to help identify where in the app the data handling occurs. Logging: The script logs method calls and arguments, which can help identify if any sensitive data is being handled improperly. Usage: Save this script to a file, e.g., trace_sensitive_data.js. Run it with Frida on your target app: frida -U -f com.example.app -l trace_sensitive_data.js --no-pause
Android SSL Pinning is a Frida script powerful tool for bypassing SSL pinning in Android applications. It use the Frida framework to intercept and patch SSL pinning methods, enabling the analysis of encrypted network traffic.
test
Bypass the "Installed from Play Store" check
Works on any(or almost any) version of IG/FB. Uses memory scan to find actual offsets
root and sslpinning
Combination of fridaantiroot and universal android ssl pinning bypass 2
Bypassing certificate pinning in COSMOTE What's Up 4.7.1 (Android)
1
Hook mouseDown on all classes inheriting NSResponder. Then whenever you click on a window or view in an application Frida will log out information on the class so you know what to further inspect or hook.
Bypass SSL certificate validation for the injected app on iOS 12
fer
search string in the memory
List UITextField and UITextView objects in the current view hierarchy and show their current content, autocorrectionType, address, and label.