okhttp3-pinning-bypass
1 | 717
Uploaded by: @federicodotta
OkHttp3 various SSL Pinning bypasses, including versions 4.2+
OkHttp3 various SSL Pinning bypasses, including versions 4.2+
Show info about methods and classes loaded via reflection on Android application
Check for interesting string comparison
Hooks libboringssl.dylib to extract TLS keys and enables decryption of network traffic from iOS apps to be decrypted. Tested on iPhone 5s running iOS 12.4.2 jailbroken with Checkrain.
有用的函数:包括模拟点击,keychain数据查看,界面结构分析,获取OC类信息等 several useful iOS utils,including keychain dumper, view dumper, perform click
Frida script to perform static security analysis of an iOS app. Works on both Objective-C and Swift based iOS apps.
get child's process id of fork
List installed iOS apps
Spoofs the current location reported by GPS
Boilerplate for a CLI tool using frida-python
This is a simple handler I have created to extract the body and request type (GET/POST) for each request made by the target iOS application. I'm @J_Duffy01 on Twitter if any q's!
How to read an std::string
Check values saved into EncryptedSharedPreferences before encryption
Look up the location of an iOS app on the device using the name displayed under the icon.
The secret diary of ninja's scripts about general Crypto Hooks
Bypass SSL certificate pinning for okhttp3