Messenger-SSL-Bypass
0 | 1K
Uploaded by: @ngohanquangvu
cre: https://github.com/Eltion
cre: https://github.com/Eltion
A Frida script that hijacks -[CLLocation coordinate] and returns spoofed GPS coordinates. It exposes simple movement helpers (right, left, up, down) that move the spoofed position by a configurable distance (default 50 m) and re-install the spoofed coordinate.
y5er
Collection of functions to enumerate ObjC classes and methods on iOS (Frida 17 API).
combines 2 bypasses
This script will add HttpLoggingInterceptor at OkHttpClient, so the HttpLoggingInterceptor will print all requests and responses.
s
This script dynamically instruments Android applications using Frida to bypass multiple security layers, including root detection, emulator detection, ADB/debugger checks, and JailMonkey anti-tampering mechanisms.
s
Enumerate code execution in app
okhttp3-bypass
my test project
httprect
Swift 4.0, iOS, AARCH64 -- see https://github.com/maltek/swift-frida/blob/master/examples/no_pinning_alamofire.js
get keys
capturing-and-decrypting-https-traffic-from-ios-apps-using-frida