Frida-Multiple-Bypass
8 | 19K
Uploaded by: @fdciabdul
Frida Multiple Bypass (SSL Pinning + Root DEtection + Emulator Detection )
Frida Multiple Bypass (SSL Pinning + Root DEtection + Emulator Detection )
Observe file system accesses by hooking some java.io.File* classes and methods, libc open/read functions and try to resolve associtation between file descriptor and path. Optionally, it can dumps the data.
Frida script to perform static security analysis of an iOS app. Works on both Objective-C and Swift based iOS apps.
[Android] Create Alert Dialog In MainActivity
Bypass certificate pinning on a Flutter-based iOS app
Hook all the methods of all the classes owned by the iOS app
Another universal ssl certificate pinning bypass script for Android (https://gist.github.com/akabe1/ac6029bf2315c6d95ff2ad00fb7be1fc)
Sockets general hooking
iOS Jailbreak Detection Bypass tested on iOS 13
Log Android TCP connections (with Java call traces, if applicable)
This is a simple handler I have created to extract the body and request type (GET/POST) for each request made by the target iOS application. I'm @J_Duffy01 on Twitter if any q's!
Dump useful values of CCCrypt function
Dumps bytes of DEX provided to InMemoryDexClassLoader on Android
[Android] Dynamic Hooks (Creating Function Hooks Was Never Easier)
Dump useful information for an iOS app
Check for native library calls and return a stacktrace