Projects by popularity

Universal Android Security Bypass Suite UASBS v1 Full Mobile Defense Disabler

0 | 0

Uploaded by: @khaledealrefaee

An advanced Frida-based Android security bypass suite for authorized penetration testing and red teaming engagements. It dynamically detects and disables all major security defenses found in mobile applications, including: • Root Detection (RootBeer, API-based, file-based, system property, etc.) • Emulator Detection (QEMU, LDPlayer, Bluestacks, Nox, etc.) • Debugger Detection (TracerPid, isDebuggerConnected, ADB flags) • Frida Detection (stack traces, process names, TCP ports, etc.) • SSL Pinning (TrustManager, OkHttp, TrustKit, WebView) • Play Integrity / SafetyNet Bypass • VPN & External Storage Detection • Biometric & Screen Lock Checks • Tamper Detection (signature, DEX, package checks) • Firebase, Retrofit, Cronet, and Firestore Communications • RealDevice / DevelopmentMode / System Properties • Dynamic Discovery & Enumeration of suspicious classes/methods Includes dynamic scanning, OPSEC-safe stealth modes, verbose logging, automatic method bypassing, and coverage for both Java and native layers. **Created by:** Khaled Al-Refaee (Ozex) **Version:** 4.0 **Date:** 2025 **Legal Use:** For licensed penetration testing, mobile app red teaming, and professional security research.

tracesslexceptions

0 | 2K

Uploaded by: @zeroinside

A PoC Frida script for tracing the android SSL exception constructors. Helps a lot with searching the code tree for the certificate pinning functions and exception sources.

iOS KeyChain

0 | 178

Uploaded by: @karim-moftah

Monitor and log all interactions with the iOS Keychain by hooking key Security framework APIs: SecItemAdd, SecItemCopyMatching, SecItemUpdate, and SecItemDelete. These APIs are responsible for adding, retrieving, updating, and removing sensitive data (such as passwords, tokens, or cryptographic keys) stored in the Keychain.