advance
0 | 1K
Uploaded by: @AnonymousVip
OkOK
OkOK
Bypassing certificate pinning in COSMOTE What's Up 4.7.1 (Android)
Apple BoringSSL Introspection
s
How it works: - It registers a new WebAppInterface class, which contains the functions to be exported (example showToast) - It then hooks the Activity to obtain a valid context - It then hooks the WebView.loadUrl method, to add a context specific WebAppInterface instance - Lastly, it overrides the annotation checks and instructs that all requested methods are allowed to be requested.
OkHttp Hostname Verifier bypass
Mascarar a localizaƧao no app
Quick tool to censor (replace with *) hashes being written to the disk. Useful, for example, for log daemons or applications where we need to filter hashes for confidentiality.
List all the firebase remote config values
Log okhttp3 http(s) communication by overloading RetryAndFollowUpInterceptor
he
Get Message Diges
Scripts to analyse Application Native Library from Android App
Script to view all files (and its contents) that app read or write.
aaa
sd