1 | 331
Uploaded by: @MMYurt
Dumps bytes of DEX provided to InMemoryDexClassLoader on Android
OkHttp3 various SSL Pinning bypasses, including versions 4.2+
iOS Jailbreak Detection Bypass tested on iOS 13
Solution to FridaLab Android application
dump SQL queries on iOS
The secret diary on ninja frida SQLite database general hooks
Show info about methods and classes loaded via reflection on Android application
Spoofs the current location reported by GPS
Hooks libboringssl.dylib to extract TLS keys and enables decryption of network traffic from iOS apps to be decrypted. Tested on iPhone 5s running iOS 12.4.2 jailbroken with Checkrain.
Useful when bypassing USB debugging detection on Android
Use liblog.so output log
You'll be able to proxy ONLY desired application HTTP traffic
Developers of Android applications usually tend to add additional "protection" (e.g. AES encryption) to their proprietary communication protocols, or to encrypt local files in order to hide some sensitive information. This snippet intercepts Java Crypto API in Android application, prints a symmetric key, algorithm spec, and a plain data right before the final encryption (as well as a cipher data right before the decryption).
This is a simple handler I have created to extract the body and request type (GET/POST) for each request made by the target iOS application. I'm @J_Duffy01 on Twitter if any q's!