hgfd
0 | 2K
Uploaded by: @maqunjing
gfd
gfd
Code to dump plaintext from Swift apps on iOS using AES.GCM.SealedBox by hooking the open method.
AndroidSSLBypass
Multi bypass for android
A script that will extract/intercept private keys from the Android+OpenSSL based binary by hooking the i2d_PrivateKey and PEM_read_bio_PrivateKey functions.
Intercepts OkHttp3 requests and prints the requests.
Frida script that bypasses FreeRASP security framework by hooking and nullifying the talsecStart method to disable runtime application self-protection (RASP) checks.
Frida script to see how payload encrypted before send to server
test project
Bypass root detection android for plugins cyberkatze iroot
Classloader
12
Combines root and debugger bypasses in one script.
An advanced Frida-based Android security bypass suite for authorized penetration testing and red teaming engagements. It dynamically detects and disables all major security defenses found in mobile applications, including: • Root Detection (RootBeer, API-based, file-based, system property, etc.) • Emulator Detection (QEMU, LDPlayer, Bluestacks, Nox, etc.) • Debugger Detection (TracerPid, isDebuggerConnected, ADB flags) • Frida Detection (stack traces, process names, TCP ports, etc.) • SSL Pinning (TrustManager, OkHttp, TrustKit, WebView) • Play Integrity / SafetyNet Bypass • VPN & External Storage Detection • Biometric & Screen Lock Checks • Tamper Detection (signature, DEX, package checks) • Firebase, Retrofit, Cronet, and Firestore Communications • RealDevice / DevelopmentMode / System Properties • Dynamic Discovery & Enumeration of suspicious classes/methods Includes dynamic scanning, OPSEC-safe stealth modes, verbose logging, automatic method bypassing, and coverage for both Java and native layers. **Created by:** Khaled Al-Refaee (Ozex) **Version:** 4.0 **Date:** 2025 **Legal Use:** For licensed penetration testing, mobile app red teaming, and professional security research.
Android Viber 26.6.4.0 SSL certificate pinning
enable android webview debugging