Instagram SSL Pinning Bypass v409
0 | 678
Uploaded by: @takaotr
Instagram SSL Pinning Bypass v409
Instagram SSL Pinning Bypass v409
Credit By : @JockerNetVIP
prints urls with headers
test2
test
Bypass for jailbreak/root detection of the freeRASP library. Works on Android and iOS. Based on the work of https://github.com/rodolfomarianocy
This project involved bypassing root detection and SSL pinning in a mobile application. I combined two separate scripts, sourced from GitHub—one for bypassing root detection and the other for bypassing SSL pinning—into a single solution, allowing me to bypass both security mechanisms simultaneously.
test
You can use this script to check if fields where sensitive information is entered are allowed to cache input. As information is entered, monitor the script output. You must attach this script after changing screens, but only when there is a text field where sensitive data may be entered. Inspired by and heavily modified version of @ay-kay/ios-keyboard-cache/
discover exported components while the code is obufsecated or u can't read it
added a new feature to check if the device is an emulator (isEmulator) and another feature to check if BusyBox is installed (hasBusyBox). Additionally, I added a new method (logInfo) to log information. Make sure to replace the placeholder logic with actual implementation details based on your needs. Adjust the logic in isEmulator and hasBusyBox to perform accurate detection.
logall
bypass jailbreak
Prints a list of all installed iOS apps.
spoof mac to iplayplus app!
IOS Application Information like application analyzer and memory dumper providing real-time inspection of app information, file system access, memory analysis, and runtime data extraction with an intuitive colored command-line interface