AES-GCM-SealedBox-open-hook
0 | 1K
Uploaded by: @rparviainen
Code to dump plaintext from Swift apps on iOS using AES.GCM.SealedBox by hooking the open method.
Code to dump plaintext from Swift apps on iOS using AES.GCM.SealedBox by hooking the open method.
A script that will extract/intercept private keys from the Android+OpenSSL based binary by hooking the i2d_PrivateKey and PEM_read_bio_PrivateKey functions.
Intercepts OkHttp3 requests and prints the requests.
test project
Bypass root detection android for plugins cyberkatze iroot
An advanced Frida-based Android security bypass suite for authorized penetration testing and red teaming engagements. It dynamically detects and disables all major security defenses found in mobile applications, including: • Root Detection (RootBeer, API-based, file-based, system property, etc.) • Emulator Detection (QEMU, LDPlayer, Bluestacks, Nox, etc.) • Debugger Detection (TracerPid, isDebuggerConnected, ADB flags) • Frida Detection (stack traces, process names, TCP ports, etc.) • SSL Pinning (TrustManager, OkHttp, TrustKit, WebView) • Play Integrity / SafetyNet Bypass • VPN & External Storage Detection • Biometric & Screen Lock Checks • Tamper Detection (signature, DEX, package checks) • Firebase, Retrofit, Cronet, and Firestore Communications • RealDevice / DevelopmentMode / System Properties • Dynamic Discovery & Enumeration of suspicious classes/methods Includes dynamic scanning, OPSEC-safe stealth modes, verbose logging, automatic method bypassing, and coverage for both Java and native layers. **Created by:** Khaled Al-Refaee (Ozex) **Version:** 4.0 **Date:** 2025 **Legal Use:** For licensed penetration testing, mobile app red teaming, and professional security research.
enable android webview debugging
ROOTBY
by-pass-br
the bypass specifically works for kony apps which has a pop up error. com.konylabs.api.ui.u
pin ssl
Rebase of an existing script. Created for personal use.
Dumper
SupportSQLiteStatement logger
Fridalab Link: https://rossmarks.uk/blog/fridalab/
Hook the BCryptDecrypt() function of the windows bcrypt.dll in order to extract decrypted contents during runtime of the hooked program.