apple-boringssl
0 | 809
Uploaded by: @oleavr
Apple BoringSSL Introspection
Apple BoringSSL Introspection
This project involved bypassing root detection and SSL pinning in a mobile application. I combined two separate scripts, sourced from GitHub—one for bypassing root detection and the other for bypassing SSL pinning—into a single solution, allowing me to bypass both security mechanisms simultaneously.
test
test
aaa
Self use
added a new feature to check if the device is an emulator (isEmulator) and another feature to check if BusyBox is installed (hasBusyBox). Additionally, I added a new method (logInfo) to log information. Make sure to replace the placeholder logic with actual implementation details based on your needs. Adjust the logic in isEmulator and hasBusyBox to perform accurate detection.
test
logall
bypass jailbreak
Desc
Bypass Xposed Detection
X
spoof mac to iplayplus app!
Bypass SSL-Pinning Thanks to "pcipolloni"
IOS Application Information like application analyzer and memory dumper providing real-time inspection of app information, file system access, memory analysis, and runtime data extraction with an intuitive colored command-line interface