hgfd
0 | 1K
Uploaded by: @maqunjing
gfd
gfd
1
httprect
Bypassing certificate pinning in COSMOTE What's Up 4.7.1 (Android)
Combination of fridaantiroot and universal android ssl pinning bypass 2
Log requests and responses made using okhttp3.
root detection and SSL pinning
Works on any(or almost any) version of IG/FB. Uses memory scan to find actual offsets
22
discover exported components while the code is obufsecated or u can't read it
test
Hooking All Types of AES Encryption Key IV
How It Works: Tracing: This script traces methods commonly involved in handling sensitive data, like retrieving data from SharedPreferences, sending SMS messages, making HTTP requests, and performing cryptographic operations. Stack Tracing: It also prints out stack traces for each call to help identify where in the app the data handling occurs. Logging: The script logs method calls and arguments, which can help identify if any sensitive data is being handled improperly. Usage: Save this script to a file, e.g., trace_sensitive_data.js. Run it with Frida on your target app: frida -U -f com.example.app -l trace_sensitive_data.js --no-pause
tiktok
get keys
test