stringcompare
1 | 7K
Uploaded by: @dzonerzy
Check for interesting string comparison
Check for interesting string comparison
Este script Frida intercepta as classes IvParameterSpec e SecretKeySpec em Java para capturar e registrar vetores de inicialização (IV) e chaves secretas usados em operações de criptografia. Ele converte esses valores em strings hexadecimais e os exibe no console, evitando repetições.
Keep MobileSubstrate from injecting an iOS app (to be used with -f to take advantage of early instrumentation)
Show Douyin SimVideo Info
Bypass frida detection
get child's process id of fork
Bay pat Facebook
Spoof location in iOS application
Boilerplate for a CLI tool using frida-python
Printing information about CCCrypt calls
Decrypt AES doFinal
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
Disable pinning by patching SecTrustEvaluate
Bypass SSL Pinning
Override MacBook charging smartness
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.