1 | 1K
Uploaded by: @stek29
This is a simple handler I have created to extract the body and request type (GET/POST) for each request made by the target iOS application. I'm @J_Duffy01 on Twitter if any q's!
Look up the location of an iOS app on the device using the name displayed under the icon.
Keep an eye on newly created objects in GNOME applications
dump SQL queries on iOS
Spoofs the current location reported by GPS
Hooks libboringssl.dylib to extract TLS keys and enables decryption of network traffic from iOS apps to be decrypted. Tested on iPhone 5s running iOS 12.4.2 jailbroken with Checkrain.
Check for native library calls and return a stacktrace
Boilerplate for a CLI tool using frida-python
Useful when bypassing USB debugging detection on Android
The secret diary on ninja frida SQLite database general hooks
get child's process id of fork
Log Android TCP connections (with Java call traces, if applicable)
The secret diary of ninja's scripts about general Crypto Hooks
The secret diary of ninja scripts' regarding TextView General Hooking
Bypass SSL certificate pinning for okhttp3