Bypass DeveloperMode Check Android
5 | 7K
Uploaded by: @zionspike
Some Android apps do not allow to run when the developer mode is enabled on the device. This script was written for bypassing developer mode check on an Android app.
Some Android apps do not allow to run when the developer mode is enabled on the device. This script was written for bypassing developer mode check on an Android app.
Dump useful information for an iOS app
Jailbreak detection bypass with a wordlist specific to Palera1n jailbreak.
Log Android TCP connections (with Java call traces, if applicable)
This is a simple handler I have created to extract the body and request type (GET/POST) for each request made by the target iOS application. I'm @J_Duffy01 on Twitter if any q's!
Script to disable Flutter TLS verification on Android and iOS. Supports DIO SSL Pinning.
Check values saved into EncryptedSharedPreferences before encryption
Check if an iOS app supports the use of custom third-party keyboards.
Spoofs the current location reported by GPS
Black-box fuzzing of URL schemes for iOS apps using SpringBoard. Automates launching the app via URL, backgrounding, and checking for a crash. Bonus function to dump all registered URL schemes.
Android Certificate Pinning Bypass for OkHttpClient
Frida script for bypassing Wi-Fi check on an Android app that allows only using cellular network.
Native Interceptor is a Frida script that allows you to intercept and monitor function calls in native libraries and processes. This script provides a wide range of customization options to help you capture and analyze the behavior of specific functions within the target application.
Script for interacting with content providers
Strace by Frida: prints system calls (SVC) and parses args/flags/errors. More at https://github.com/FrenchYeti/interruptor
Jailbreak bypass with Sileo/cydia and others paths, this script also tries to bypass common anti tampers, like ptrace, sysctl and getppid. This script DONT use resolver [** isJail**] and this script is not a silver bullet thanks :)