https-stalker
0 | 1K
Uploaded by: @lolicon
trace https payloads
trace https payloads
Android Hermes engine hook react native function calls
Custom SSLCertificateChecker.execute() implementation bypass | App only proceeds if success callback is received
iOS Jailbreak Detection Bypass
Log okhttp3 http(s) communication by overloading RetryAndFollowUpInterceptor
Getting Intent from Android app
When calculating prices for services, evaluations are made between the sales team and the technical team regarding the time required to complete the target mobile application. However, certain mobile applications, due to their structure, may extend the security testing process. For example, static security tests for a Flutter application with an enabled SSL module and a Cordova application without a client security module may require different working hours. In such cases, it would be useful to quickly detect which framework(s) the target application uses. To facilitate this, I developed a simple script with Frida that identifies the frameworks used by the target mobile application. In the future, I will also work on development for iOS.
sslpinning
test
test
DanielTesting
teste4
find full class path for Java.use() method. Sometimes its hard byhand)
Disable Certificate Verification on Flutter Windows x64 applications.
Analyze the security of iOS encryption and hashing operations. Run the script, use the application normally, then enter 'summary()' to print a security analysis.
Log requests and responses made using okhttp3.