TG Swift PIP
1 | 804
Uploaded by: @stek29
See https://github.com/overtake/TelegramSwift/pull/22
See https://github.com/overtake/TelegramSwift/pull/22
Bypass SSL certificate pinning for okhttp3
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
iOS Jailbreak Detection Bypass tested on iOS 13
跟踪App的越狱检测逻辑: trace app behaviour of jailbreak detecting
OkHttp3 various SSL Pinning bypasses, including versions 4.2+
Logging tool that send Frida log to Mac NSLoggerViewer
Hooks libboringssl.dylib to extract TLS keys and enables decryption of network traffic from iOS apps to be decrypted. Tested on iPhone 5s running iOS 12.4.2 jailbroken with Checkrain.
Backtrace HTTP request.
Look up the location of an iOS app on the device using the name displayed under the icon.
Boilerplate for a CLI tool using frida-python
Developers of Android applications usually tend to add additional "protection" (e.g. AES encryption) to their proprietary communication protocols, or to encrypt local files in order to hide some sensitive information. This snippet intercepts Java Crypto API in Android application, prints a symmetric key, algorithm spec, and a plain data right before the final encryption (as well as a cipher data right before the decryption).
List installed iOS apps
Show info about methods and classes loaded via reflection on Android application
Spoofs the current location reported by GPS
get child's process id of fork