force enable strictmode
0 | 1K
Uploaded by: @dvdface
force enable strictmode for specified application in android, use this feature to check app's strictmode violation. if registerClass failed, setenforce 0.
force enable strictmode for specified application in android, use this feature to check app's strictmode violation. if registerClass failed, setenforce 0.
test root detection
CURL is using it's own proxy. So, it will be difficult to intercept HTTP(S) calls on Windows using some http proxy tools. I decided to hook the export calls for the target app using frida. Then it was happen.
junc
Configures SSHd to 22/tcp port
a
test
a simple code to block root checking function
Custom SSLCertificateChecker.execute() implementation bypass | App only proceeds if success callback is received
This Frida script bypasses multiple Android proxy detection techniques and forces application traffic through Burp Suite. Scenario: The target Android application was detecting active proxies and blocking network communication by freezing on the main activity. Although SSL pinning was successfully bypassed, no traffic was visible in Burp Suite. API endpoints were only observable via Frida logs. This script is intended for educational purposes and authorized security testing only.
Observe PIDs interacting with a given target process' UNIX sockets on i/macOS
This Frida script was developed by Ahmed Gamal – ZeroSploit MEA to dynamically bypass multiple popular iOS jailbreak detection frameworks during runtime analysis and mobile application security testing. The script targets and neutralizes detection logic implemented in the following frameworks: DTTJailbreakDetection.framework IOSSecuritySuite.framework jailbreak_root_detection.framework safe_device.framework
test2
Reveny Android Emulator Detection Bypass
2026
Transparent Proxy via Frida hooks (https://github.com/TheZ3ro/proxyfire)