0 | 1K
This project involved bypassing root detection and SSL pinning in a mobile application. I combined two separate scripts, sourced from GitHub—one for bypassing root detection and the other for bypassing SSL pinning—into a single solution, allowing me to bypass both security mechanisms simultaneously.
0 | 2
test
0 | 3K
Hook okhttp3 but supports project with okio obfuscated. Based on https://codeshare.frida.re/@owen800q/okhttp3-interceptor/
0 | 188
aaa
0 | 3K
e
0 | 1K
added a new feature to check if the device is an emulator (isEmulator) and another feature to check if BusyBox is installed (hasBusyBox). Additionally, I added a new method (logInfo) to log information. Make sure to replace the placeholder logic with actual implementation details based on your needs. Adjust the logic in isEmulator and hasBusyBox to perform accurate detection.
0 | 651
Uploaded by: @0o120
test
0 | 345
logall
0 | 2K
bypass jailbreak
0 | 1K
Desc
0 | 274
Bypass Xposed Detection
0 | 275
X
0 | 98
spoof mac to iplayplus app!
0 | 1K
Bypass SSL-Pinning Thanks to "pcipolloni"
0 | 1K
IOS Application Information like application analyzer and memory dumper providing real-time inspection of app information, file system access, memory analysis, and runtime data extraction with an intuitive colored command-line interface
0 | 814
use StrictMode.noteSlowCall to mark common slow binder call on main thread(IActivityManager, IPackageManager, IConnectivityManager)