FridaSwiftDump
2 | 6K
Uploaded by: @neil-wu
FridaSwiftDump a Frida tool for retriving the Swift Object info from an running app.
FridaSwiftDump a Frida tool for retriving the Swift Object info from an running app.
Print all SQL queries executed from android sqlite, and sqlcipher
Use liblog.so output log
Dynamically tracing Java function calls within a given package
Frida script to bypass proxy/VPN detection is iOS implemented via the CFNetworkCopySystemProxySettings function using CFNetwork Module
dump SQL queries on iOS
Simple mod menu for Android.
Trace invocations of the RegisterNatives JNI API, to identify native functions registered from within native code on runtime
IOS SSL Pinning and AES Encryption And IOS Versioning Check Bypass Script is well tested in IOS 16,15,14,12 Let me know in case any issue arises, we have successfully bypass all three condition from this script written by bira & idiotic
TLS/SSL pinning bypass for iOS 13
Logging tool that send Frida log to Mac NSLoggerViewer
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Android Root-detection Bypass
Use this script to print out the trace for any methods calling Random instead of SecureRandom.
Bypass frida detection
Frida script to modify the iOS Keychain values which are getting updated on runtime