raptor-frida-android-trace
1 | 821
Uploaded by: @0xdea
Full-featured Java and Module tracer for Android.
Full-featured Java and Module tracer for Android.
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Backtrace HTTP request.
Bypass frida detection
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
See https://github.com/overtake/TelegramSwift/pull/22
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Secret diary of ninja's OkHTTP General Hooks
let me know !
Full-featured ObjC and Module tracer for iOS.
Common security protections bypass script for Android (USB debugging, Developer options, Play protect)
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
iOS SSL Bypass
Logging tool that send Frida log to Mac NSLoggerViewer
A Frida script for native networking functions (getaddrinfo, connect, send and recv)
TLS/SSL pinning bypass for iOS 13