rootandpinning
0 | 347
Uploaded by: @acsayson
root and sslpinning
root and sslpinning
Bypass the "Installed from Play Store" check
Android SSL Pinning is a Frida script powerful tool for bypassing SSL pinning in Android applications. It use the Frida framework to intercept and patch SSL pinning methods, enabling the analysis of encrypted network traffic.
Android universal pinning
CURL is using it's own proxy. So, it will be difficult to intercept HTTP(S) calls on Windows using some http proxy tools. I decided to hook the export calls for the target app using frida. Then it was happen.
4
sdsdsd
junc
Configures SSHd to 22/tcp port
add trace for binder call from binderproxy, use this feature to figure out which binder interface it calls
I Stole 99% of Code and Effort from dki But Added File Read Capabilities
Based on `andydavies/ios-tls-keylogger` with 0x2b8 callback
Print in console the security provider used in the application (MSTG-NETWORK-6)
Android Hermes engine hook react native function calls
Custom SSLCertificateChecker.execute() implementation bypass | App only proceeds if success callback is received
test