ios-backtrace-http-req
1 | 4K
Uploaded by: @SYM01
Backtrace HTTP request.
Backtrace HTTP request.
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Secret diary of ninja's OkHTTP General Hooks
Script for geoposition and motion sensor activity forgery for pacer app
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
A Frida script for native networking functions (getaddrinfo, connect, send and recv)
iOS SSL Bypass
Bypass Facebook SSL pinning on Android devices.
Simple script to bypass Instagram SSL Pinning, have fun.
Override MacBook charging smartness
Rebase of an existing script. Created for personal use.
Boilerplate for a CLI tool using frida-python
Look up the location of an iOS app on the device using the name displayed under the icon.
Use this script to print out the trace for any methods calling Random instead of SecureRandom.