advance
0 | 1K
Uploaded by: @AnonymousVip
OkOK
OkOK
eee
Rebase of an existing script. Created for personal use.
Hook mouseDown on all classes inheriting NSResponder. Then whenever you click on a window or view in an application Frida will log out information on the class so you know what to further inspect or hook.
root and sslpinning
Bypass the "Installed from Play Store" check
Android SSL Pinning is a Frida script powerful tool for bypassing SSL pinning in Android applications. It use the Frida framework to intercept and patch SSL pinning methods, enabling the analysis of encrypted network traffic.
oh kcuf
sda
Based on `andydavies/ios-tls-keylogger` with 0x2b8 callback
Dump methods from activity
test
test
DanielTesting
find full class path for Java.use() method. Sometimes its hard byhand)
Tabdool