iOS Jailbreak Detection Bypass
1 | 1K
Uploaded by: @patali09
This script helps to bypass the iOS jailbreak detection. This project is forked from /@DevTraleski/ios-jailbreak-detection-bypass-palera1n/
This script helps to bypass the iOS jailbreak detection. This project is forked from /@DevTraleski/ios-jailbreak-detection-bypass-palera1n/
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Full-featured Java and Module tracer for Android.
Monitors Android deeplink activity and WebView JavaScript interfaces (JSI) using Frida. Tracks Intent data, JavaScript interface usage, and WebView.evaluateJavascript execution.
Hooks libboringssl.dylib to extract TLS keys and enables decryption of network traffic from iOS apps to be decrypted. Tested on iPhone 5s running iOS 12.4.2 jailbroken with Checkrain.
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
frida script for bypassing root detection implemented with rootbeer library - https://github.com/scottyab/rootbeer
This script will bypass all root detection methods. Its included File.exists() Runtime.exec("su") Build.TAGS, FINGERPRINT RootDetectionActivity.isRooted() SystemProperties.get() XposedBridge detection Magisk detection RootBeer API hooks libc native su calls detection methods bypass.
Bypass Facebook SSL pinning on Android devices.
Override MacBook charging smartness
let me know !
TEST FOR BYPASS
iOS SSL Bypass
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Backtrace HTTP request.
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.