Android Deep Link Observer
5 | 16K
Uploaded by: @leolashkevych
Dumping URI data from a deep link
Dumping URI data from a deep link
Dump useful values of CCCrypt function
Log Android TCP connections (with Java call traces, if applicable)
Dump useful information for an iOS app
Script to disable Flutter TLS verification on Android and iOS. Supports DIO SSL Pinning.
Enable WebView debugging for all iOS apps (Jailbreak required).
Some Android apps do not allow to run when the developer mode is enabled on the device. This script was written for bypassing developer mode check on an Android app.
This is a simple handler I have created to extract the body and request type (GET/POST) for each request made by the target iOS application. I'm @J_Duffy01 on Twitter if any q's!
Frida script for bypassing Wi-Fi check on an Android app that allows only using cellular network.
Check if an iOS app supports the use of custom third-party keyboards.
Crypto: A Suite of frida scripts regarding cryptography for general penetration testing and research purposes
Android Certificate Pinning Bypass for OkHttpClient
Bypass Tiktok SSL pinning on Android devices.
Jailbreak bypass with Sileo/cydia and others paths, this script also tries to bypass common anti tampers, like ptrace, sysctl and getppid. This script DONT use resolver [** isJail**] and this script is not a silver bullet thanks :)
Bypass Instagram SSL pinning on Android devices.
Native Interceptor is a Frida script that allows you to intercept and monitor function calls in native libraries and processes. This script provides a wide range of customization options to help you capture and analyze the behavior of specific functions within the target application.