1bdool492
0 | 310
Uploaded by: @abdolzx
byass
byass
Monitor and log all interactions with the iOS Keychain by hooking key Security framework APIs: SecItemAdd, SecItemCopyMatching, SecItemUpdate, and SecItemDelete. These APIs are responsible for adding, retrieving, updating, and removing sensitive data (such as passwords, tokens, or cryptographic keys) stored in the Keychain.
Universal Root Detection and SSL Pinning Bypass
Intercepts OkHttp3 requests redirects them to tls.peet.ws and prints the response.
A Frida script that hijacks -[CLLocation coordinate] and returns spoofed GPS coordinates. It exposes simple movement helpers (right, left, up, down) that move the spoofed position by a configurable distance (default 50 m) and re-install the spoofed coordinate.
test3
This script hooks into a function called IsDrived() which contains several private function.
ok
Swift StringI nterceptor
cre: https://github.com/Eltion
Code to dump symmetric key bytes from Swift apps on iOS using SymmetricKey by hooking the constructor
y5er
Collection of functions to enumerate ObjC classes and methods on iOS (Frida 17 API).
This Frida script bypasses both root detection and SSL pinning mechanisms in Android applications.
Enumerate code execution in app
s