iOS sqlite3
0 | 66
Uploaded by: @karim-moftah
Hooks sqlite3_prepare, sqlite3_prepare_v2, sqlite3_prepare_v3, sqlite3_prepare16, sqlite3_prepare16_v2, sqlite3_prepare16_v3
Hooks sqlite3_prepare, sqlite3_prepare_v2, sqlite3_prepare_v3, sqlite3_prepare16, sqlite3_prepare16_v2, sqlite3_prepare16_v3
Script to bypass Frida detection
Disable SSL certificate check for iOS app.
objection agents test
How it works: - It registers a new WebAppInterface class, which contains the functions to be exported (example showToast) - It then hooks the Activity to obtain a valid context - It then hooks the WebView.loadUrl method, to add a context specific WebAppInterface instance - Lastly, it overrides the annotation checks and instructs that all requested methods are allowed to be requested.
This Frida script hooks into Appleās CoreLocation framework to simulate a moving GPS location on iOS apps. It intercepts CLLocationManager methods and continuously delivers fake location updates that appear as if the device is walking randomly within a defined area.
1
Latest Scottyab Root bypass
Created for personal use.
Frida
Bypass the commonly used root techniques designed for simple apps, intended for testing purposes. Strong Runtime Application Self-Protection (RASP) will detect this easily.
Dump dynamically created files, note: this require a custom send message handler
This is solution script for FridaLab Challenge(https://rossmarks.uk/blog/fridalab/).
Hooks TensorFlow Lite classes to initialize a *.tflite model and writes them to disk. Adjust the file path as needed!
tt
Script to observer the Activities stack trace in Runtime.