iOS 15 TLS Keylogger
1 | 2K
Uploaded by: @jankais3r
Hooks libboringssl.dylib to extract TLS keys and enables decryption of network traffic from iOS apps to be decrypted.
Hooks libboringssl.dylib to extract TLS keys and enables decryption of network traffic from iOS apps to be decrypted.
This script will bypass all root detection methods. Its included File.exists() Runtime.exec("su") Build.TAGS, FINGERPRINT RootDetectionActivity.isRooted() SystemProperties.get() XposedBridge detection Magisk detection RootBeer API hooks libc native su calls detection methods bypass.
This script helps to bypass the iOS jailbreak detection. This project is forked from /@DevTraleski/ios-jailbreak-detection-bypass-palera1n/
Look up the location of an iOS app on the device using the name displayed under the icon.
See https://github.com/overtake/TelegramSwift/pull/22
Backtrace HTTP request.
Frida script to bypass RootBeer root detection and SSL pinning in OkHttp, TrustManager, HttpsURLConnection, and WebView. Includes request/response logging.
logs https requests with body headers url, without worrying about using a proxy.
Change various Android Device Characteristics in order to return a Log4J payload
This Code is running and bypassing latest okhttp3 with obfuscated code.
bypass jailbreak plus ssl check ios 16
Class: AppDelegate and Method:isNewJailBreak
The script hooks into the onTextChanged method of android.widget.TextView. It dynamically identifies the view class and queries the Android system to see if the view is protected against obscured touches (overlays). If the protection is disabled (false), it flags the view as vulnerable to Tapjacking.
Flutter, OkHTTPv3, HttpsURLConnection, TrustKit universal SSL unpinner for Android.
Monitors Android deeplink activity and WebView JavaScript interfaces (JSI) using Frida. Tracks Intent data, JavaScript interface usage, and WebView.evaluateJavascript execution.
This comprehensive Frida script bypasses over 30 different SSL pinning implementations, ranging from standard Java/Kotlin libraries (OkHttp, TrustKit) to native Flutter certificate verification. It works by forcing a "trust-all" state across nearly all modern Android networking stacks to allow seamless HTTPS traffic interception.