SSLSlayerv3
1 | 49
Uploaded by: @dodal-omkar
A Frida-based script to bypass SSL pinning in Android applications during security assessments. Built to handle real-world implementations across framework, library, and custom trust validation layers.
A Frida-based script to bypass SSL pinning in Android applications during security assessments. Built to handle real-world implementations across framework, library, and custom trust validation layers.
Modify iOS function's implementation
Spoof location in iOS application
Full-featured ObjC and Module tracer for iOS.
Display some info about hashing routine called on Android application
Logs full request and response details (headers, body, status) for network calls made via Alamofire's SessionDelegate. (iOS)
Bypasses jailbreak detection in any "React-Native" app that relies on the 'jail-monkey' library for it's jailbreak detection.
This comprehensive Frida script bypasses over 30 different SSL pinning implementations, ranging from standard Java/Kotlin libraries (OkHttp, TrustKit) to native Flutter certificate verification. It works by forcing a "trust-all" state across nearly all modern Android networking stacks to allow seamless HTTPS traffic interception.
Disables jailbreak detection in the Vipps app
跟踪App的越狱检测逻辑: trace app behaviour of jailbreak detecting
let me know !
Monitors Android deeplink activity and WebView JavaScript interfaces (JSI) using Frida. Tracks Intent data, JavaScript interface usage, and WebView.evaluateJavascript execution.
Script to instantly display current tab URL on Chrome Android (Suitable for fast URL capturing). Buy me a coffee: https://www.buymeacoffee.com/raphaelQ
Hooking All Types of AES Encryption Key IV
See https://github.com/overtake/TelegramSwift/pull/22
This script will perform to bypass most of the restriction like root, integrity checks. Kindly replace the app package name and use deepseek ai.