0 | 545
Uploaded by: @komoosdosk
sdf
sdf
This script dynamically instruments Android applications using Frida to bypass multiple security layers, including root detection, emulator detection, ADB/debugger checks, and JailMonkey anti-tampering mechanisms.
s
12
This is solution script for FridaLab Challenge(https://rossmarks.uk/blog/fridalab/).
Collection of functions to enumerate ObjC classes and methods on iOS (Frida 17 API).
y5er
Combines root and debugger bypasses in one script.
cre: https://github.com/Eltion
killSSL for FB
This project hooks common SSL libraries on Android to intercept TLS functions. By attaching to the SSL_CTX_new function and installing the SSL_CTX_set_keylog_callback on exit, it prints SSL/TLS session keys in the standard SSLKEYLOG format to the terminal. This allows users to capture the keys needed to decrypt TLS traffic (e.g., from pcap files) with tools that support the SSLKEYLOG format.
Swift StringI nterceptor
ok
This script hooks into a function called IsDrived() which contains several private function.
test3
Android SSL Pinning bypass