0 | 1K
CURL is using it's own proxy. So, it will be difficult to intercept HTTP(S) calls on Windows using some http proxy tools. I decided to hook the export calls for the target app using frida. Then it was happen.
0 | 1K
4
0 | 936
2
0 | 2K
sdsdsd
0 | 795
junc
0 | 1K
s
0 | 882
Configures SSHd to 22/tcp port
0 | 433
a
0 | 7
this is my attempt to create an universal bypass script for android
0 | 1K
Inspect WebView-related functions such as loadUrl(), shouldOverrideUrlLoading(), or onPageFinished(). For testing "MASTG-TEST-0027: Testing for URL Loading in WebViews"
0 | 965
This script hooks a variety of functions related to SSL/TLS implementations and socket operations across different libraries and platforms. When these functions are called, the script will: Log which function was called Show which module called it Display a detailed stack trace with module information . This should help you identify exactly where SSL/TLS operations are happening and which modules are responsible for certificate verification and secure communication.RetryClaude can make mistakes. Please double-check responses.
0 | 3K
I Stole 99% of Code and Effort from dki But Added File Read Capabilities
0 | 3K
Syscall tracing & args/flags/error/signal parsing with strace-like output for Android x64 (tested with emulator & Android 13). See more at https://github.com/FrenchYeti/interruptor
0 | 517
test
0 | 59
a simple code to block root checking function
0 | 3K
Print in console the security provider used in the application (MSTG-NETWORK-6)