freeRASP Root Detection Bypass
1 | 542
Uploaded by: @sasasec
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Frida script to modify the iOS Keychain values which are getting updated on runtime
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Bypass frida detection
Universal Robust Advanced Root SSL Pinning Bypass this script cover most advance plus all possible test cases for root detection and ssl pinning bypass.
Change various Android Device Characteristics in order to return a Log4J payload
Bay pat Facebook
Decrypt AES doFinal
Functions and classes that help you in hooking some Swift functions
Secret diary of ninja's OkHTTP General Hooks
Logging tool that send Frida log to Mac NSLoggerViewer
TLS/SSL pinning bypass for iOS 13
Full-featured Java and Module tracer for Android.
Use this script to print out the trace for any methods calling Random instead of SecureRandom.
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.