frida-universal-pinning-bypasser
6 | 11K
Uploaded by: @akabe1
Another universal ssl certificate pinning bypass script for Android (https://gist.github.com/akabe1/ac6029bf2315c6d95ff2ad00fb7be1fc)
Another universal ssl certificate pinning bypass script for Android (https://gist.github.com/akabe1/ac6029bf2315c6d95ff2ad00fb7be1fc)
bypass mostly common android ssl pinning method
Observe file system accesses by hooking some java.io.File* classes and methods, libc open/read functions and try to resolve associtation between file descriptor and path. Optionally, it can dumps the data.
Frida script to perform static security analysis of an iOS app. Works on both Objective-C and Swift based iOS apps.
iOS Jailbreak Detection Bypass tested on iOS 13
Sockets general hooking
Bypasses debugging mode checks when USB Debugging mode is activated
Bypass certificate pinning on a Flutter-based iOS app
Dump useful information for an iOS app
Hook all the methods of all the classes owned by the iOS app
Dump useful values of CCCrypt function
Check if an iOS app supports the use of custom third-party keyboards.
[Android] Dynamic Hooks (Creating Function Hooks Was Never Easier)
Android Certificate Pinning Bypass for OkHttpClient
Frida script for bypassing Wi-Fi check on an Android app that allows only using cellular network.
Dumps bytes of DEX provided to InMemoryDexClassLoader on Android