0 | 1K
CURL is using it's own proxy. So, it will be difficult to intercept HTTP(S) calls on Windows using some http proxy tools. I decided to hook the export calls for the target app using frida. Then it was happen.
0 | 1K
4
0 | 963
2
0 | 2K
sdsdsd
0 | 816
junc
0 | 1K
s
0 | 910
Configures SSHd to 22/tcp port
0 | 460
a
0 | 58
this is my attempt to create an universal bypass script for android
0 | 2K
discover exported components while the code is obufsecated or u can't read it
0 | 2K
Inspect WebView-related functions such as loadUrl(), shouldOverrideUrlLoading(), or onPageFinished(). For testing "MASTG-TEST-0027: Testing for URL Loading in WebViews"
0 | 3K
I Stole 99% of Code and Effort from dki But Added File Read Capabilities
0 | 3K
Syscall tracing & args/flags/error/signal parsing with strace-like output for Android x64 (tested with emulator & Android 13). See more at https://github.com/FrenchYeti/interruptor
0 | 535
test
0 | 84
a simple code to block root checking function
0 | 3K
Print in console the security provider used in the application (MSTG-NETWORK-6)