WebViewInspect
1 | 2K
Uploaded by: @unexpectedBy
expose all WebView input fields
expose all WebView input fields
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Spoof location in iOS application
bypass jailbreak plus ssl check ios 16
iOS SSL Bypass
Bypass the jailbreak and malware detection in apps using the IBM Security Trusteer Mobile SDK for iOS
Universal Robust Advanced Root SSL Pinning Bypass this script cover most advance plus all possible test cases for root detection and ssl pinning bypass.
frida script for bypassing root detection implemented with rootbeer library - https://github.com/scottyab/rootbeer
Get the list of the checked paths during jailbreak detection
Change various Android Device Characteristics in order to return a Log4J payload
See https://github.com/overtake/TelegramSwift/pull/22
Printing information about CCCrypt calls
Este script Frida intercepta as classes IvParameterSpec e SecretKeySpec em Java para capturar e registrar vetores de inicialização (IV) e chaves secretas usados em operações de criptografia. Ele converte esses valores em strings hexadecimais e os exibe no console, evitando repetições.
Use this script when you notice that your Frida script crashes the iOS app process after 10 seconds. It will disable the iOS watchdog to allow your Frida script to continue loading. Use "SpringBoard" as your Frida target.
Flutter, OkHTTPv3, HttpsURLConnection, TrustKit universal SSL unpinner for Android.
This Code is running and bypassing latest okhttp3 with obfuscated code.