advance
0 | 1K
Uploaded by: @AnonymousVip
OkOK
OkOK
emulator checker
eee
Bypass Signature Checker of IJIAMI Apps.
Rebase of an existing script. Created for personal use.
Hook mouseDown on all classes inheriting NSResponder. Then whenever you click on a window or view in an application Frida will log out information on the class so you know what to further inspect or hook.
root and sslpinning
Bypass the "Installed from Play Store" check
Android SSL Pinning is a Frida script powerful tool for bypassing SSL pinning in Android applications. It use the Frida framework to intercept and patch SSL pinning methods, enabling the analysis of encrypted network traffic.
faa
Full-featured Java and Module tracer for Android (Frida 17 API).
oh kcuf
sda
Testes
Based on `andydavies/ios-tls-keylogger` with 0x2b8 callback
Dump methods from activity