a
0 | 727
Uploaded by: @komoosdosk
a
a
Rebase of an existing script. Created for personal use.
Add an interceptor at okhttp object in order to log all request and responses
Hook mouseDown on all classes inheriting NSResponder. Then whenever you click on a window or view in an application Frida will log out information on the class so you know what to further inspect or hook.
TikTok Lite SSL Unpinning
root and sslpinning
Frida script that bypasses Touch ID/Face ID authentication by intercepting LocalAuthentication framework calls and forcing them to return success.
Bypass the "Installed from Play Store" check
This script will perform to bypass most of the restriction like root, integrity checks. Kindly replace the app package name and use deepseek ai.
Android SSL Pinning is a Frida script powerful tool for bypassing SSL pinning in Android applications. It use the Frida framework to intercept and patch SSL pinning methods, enabling the analysis of encrypted network traffic.
faa
This is a comprehensive, all-in-one Frida script designed for security researchers and authorized penetration testers. It aims to streamline the dynamic analysis process by neutralizing multiple layers of client-side security often found in modern production Android applications.
Full-featured Java and Module tracer for Android (Frida 17 API).
Multi bypass for android
oh kcuf
sda