Projects by popularity

Dump iOS Text Views

0 | 4K

Uploaded by: @dki

List UITextField and UITextView objects in the current view hierarchy and show their current content, autocorrectionType, address, and label.

IOS Memory Dump

0 | 20

Uploaded by: @TK757567

A Frida script to monitor memory operations on iOS. This tool intercepts the memcpy function within libsystem_c.dylib to capture sensitive data—such as API keys, secrets, or request payloads—as they are moved within the application's memory. The script is working for frida version less than 17 cause it is using the function findExportByName which is now is removed on version 17

tracesensitivedata

0 | 1K

Uploaded by: @stish834

How It Works: Tracing: This script traces methods commonly involved in handling sensitive data, like retrieving data from SharedPreferences, sending SMS messages, making HTTP requests, and performing cryptographic operations. Stack Tracing: It also prints out stack traces for each call to help identify where in the app the data handling occurs. Logging: The script logs method calls and arguments, which can help identify if any sensitive data is being handled improperly. Usage: Save this script to a file, e.g., trace_sensitive_data.js. Run it with Frida on your target app: frida -U -f com.example.app -l trace_sensitive_data.js --no-pause

Android Java Interceptor

0 | 5K

Uploaded by: @hyugogirubato

Android Java Interceptor is a Frida script intercepts and logs method calls in an Android app. It uses the Frida framework to hook into the target app, capture method invocations, and print information about arguments and return values.