SupportSQLiteStatement
0 | 253
Uploaded by: @marcohald
SupportSQLiteStatement logger
SupportSQLiteStatement logger
AndroidSSLBypass
Fridalab Link: https://rossmarks.uk/blog/fridalab/
httprect
Hook the BCryptDecrypt() function of the windows bcrypt.dll in order to extract decrypted contents during runtime of the hooked program.
This is a first test application project.
A PoC Frida script for tracing the android SSL exception constructors. Helps a lot with searching the code tree for the certificate pinning functions and exception sources.
script test
Universal Root Detection and SSL Pinning Bypass
a
byass
Monitor and log all interactions with the iOS Keychain by hooking key Security framework APIs: SecItemAdd, SecItemCopyMatching, SecItemUpdate, and SecItemDelete. These APIs are responsible for adding, retrieving, updating, and removing sensitive data (such as passwords, tokens, or cryptographic keys) stored in the Keychain.
This Frida script bypasses both root detection and SSL pinning mechanisms in Android applications.
Intercepts OkHttp3 requests redirects them to tls.peet.ws and prints the response.
A Frida script that hijacks -[CLLocation coordinate] and returns spoofed GPS coordinates. It exposes simple movement helpers (right, left, up, down) that move the spoofed position by a configurable distance (default 50 m) and re-install the spoofed coordinate.
test3