CCCrypt dump
5 | 8K
Uploaded by: @xperylab
Dump useful values of CCCrypt function
Dump useful values of CCCrypt function
Some Android apps do not allow to run when the developer mode is enabled on the device. This script was written for bypassing developer mode check on an Android app.
Dump useful information for an iOS app
Enable WebView debugging for all iOS apps (Jailbreak required).
Log Android TCP connections (with Java call traces, if applicable)
Script to disable Flutter TLS verification on Android and iOS. Supports DIO SSL Pinning.
This is a simple handler I have created to extract the body and request type (GET/POST) for each request made by the target iOS application. I'm @J_Duffy01 on Twitter if any q's!
Check if an iOS app supports the use of custom third-party keyboards.
Black-box fuzzing of URL schemes for iOS apps using SpringBoard. Automates launching the app via URL, backgrounding, and checking for a crash. Bonus function to dump all registered URL schemes.
Spoofs the current location reported by GPS
Check values saved into EncryptedSharedPreferences before encryption
Strace by Frida: prints system calls (SVC) and parses args/flags/errors. More at https://github.com/FrenchYeti/interruptor
Bypass Instagram SSL pinning on Android devices.
Script for interacting with content providers
Jailbreak bypass with Sileo/cydia and others paths, this script also tries to bypass common anti tampers, like ptrace, sysctl and getppid. This script DONT use resolver [** isJail**] and this script is not a silver bullet thanks :)
Native Interceptor is a Frida script that allows you to intercept and monitor function calls in native libraries and processes. This script provides a wide range of customization options to help you capture and analyze the behavior of specific functions within the target application.