0 | 1K
Uploaded by: @pbalmelle
Automatically extract KeyStore objects and relative password from Android applications with Frida
Another Android ssl certificate pinning bypass for various methods (https://gist.github.com/akabe1/5632cbc1cd49f0237cbd0a93bc8e4452)
Observe file system accesses by hooking some java.io.File* classes and methods, libc open/read functions and try to resolve associtation between file descriptor and path. Optionally, it can dumps the data.
Bypasses debugging mode checks when USB Debugging mode is activated
Disable SSL certificate check for iOS app.
Trust User Installed Certificate
Swift 4.0, iOS, AARCH64 -- see https://github.com/maltek/swift-frida/blob/master/examples/no_pinning_alamofire.js
Another universal ssl certificate pinning bypass script for Android (https://gist.github.com/akabe1/ac6029bf2315c6d95ff2ad00fb7be1fc)
iOS only, requires pycparser for Python 3 -- for details, see https://github.com/maltek/swift-frida/tree/master/examples/c_header_gen
trivial script to list all loaded classes
List UITextField and UITextView objects in the current view hierarchy and show their current content, autocorrectionType, address, and label.
[Android] Dynamic Hooks (Creating Function Hooks Was Never Easier)
objection agents test