Seek Hook Destroy
0 | 1K
Uploaded by: @imagogitter
Find java classes. hook em? destroy em?
Find java classes. hook em? destroy em?
Only for Uncrackable L1.
A script that writes strings generated at runtime to the terminal, along with the class from which they are called. It can help identify cryptographic keys and analyze meaningful data within obfusticated code.
Hooks TensorFlow Lite classes to initialize a *.tflite model and writes them to disk. Adjust the file path as needed!
Classloader
This Frida script bypasses both root detection and SSL pinning mechanisms in Android applications.
Bypass all detection by freeRASP Android
Dump methods from activity
Combines root and debugger bypasses in one script.
Cross-platform Frida CodeShare script loader.
Loads multiple Frida CodeShare scripts in one shot.
Bypass iOS jailbreak detection
Analyze the security of iOS encryption and hashing operations. Run the script, use the application normally, then enter 'summary()' to print a security analysis.
This dumps encryption ciphers for testing MASTG-TEST-0061: Verifying the Configuration of Cryptographic Standard Algorithms
When calculating prices for services, evaluations are made between the sales team and the technical team regarding the time required to complete the target mobile application. However, certain mobile applications, due to their structure, may extend the security testing process. For example, static security tests for a Flutter application with an enabled SSL module and a Cordova application without a client security module may require different working hours. In such cases, it would be useful to quickly detect which framework(s) the target application uses. To facilitate this, I developed a simple script with Frida that identifies the frameworks used by the target mobile application. In the future, I will also work on development for iOS.
IOS Application Information like application analyzer and memory dumper providing real-time inspection of app information, file system access, memory analysis, and runtime data extraction with an intuitive colored command-line interface