iOS Jailbreak Detection Bypass
1 | 7K
Uploaded by: @liangxiaoyi1024
iOS Jailbreak Detection Bypass tested on iOS 13
iOS Jailbreak Detection Bypass tested on iOS 13
Show info about methods and classes loaded via reflection on Android application
Trust User Installed Certificate
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
You'll be able to proxy ONLY desired application HTTP traffic
Use liblog.so output log
Keep an eye on newly created objects in GNOME applications
获取设备参数,检测改机工具能力: get device parameter
Frida script to perform static security analysis of an iOS app. Works on both Objective-C and Swift based iOS apps.
Sockets general hooking
How to read an std::string
Universal Android SSL Pinning Bypass
Spoof location in iOS application
Check for native library calls and return a stacktrace
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
aaaaaazazza