Xposed
0 | 646
Uploaded by: @Hyupai
Bypass Xposed Detection
Bypass Xposed Detection
Thanks https://github.com/Eltion/Facebook-SSL-Pinning-Bypass
This is a first test application project.
Intercepts OkHttp3 requests redirects them to tls.peet.ws and prints the response.
Intercepts OkHttp3 requests and prints the requests.
X
bypass
aaa
find radio button of p2mais...
This script hooks a variety of functions related to SSL/TLS implementations and socket operations across different libraries and platforms. When these functions are called, the script will: Log which function was called Show which module called it Display a detailed stack trace with module information . This should help you identify exactly where SSL/TLS operations are happening and which modules are responsible for certificate verification and secure communication.RetryClaude can make mistakes. Please double-check responses.
a
Hook Custom Function in C/C++
List All C/C++ Functions in a Module
script test
This project involved bypassing root detection and SSL pinning in a mobile application. I combined two separate scripts, sourced from GitHub—one for bypassing root detection and the other for bypassing SSL pinning—into a single solution, allowing me to bypass both security mechanisms simultaneously.
hopefully works haha