iOS SSL Bypass
1 | 12K
Uploaded by: @lichao890427
iOS SSL Bypass
iOS SSL Bypass
Backtrace HTTP request.
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Secret diary of ninja's OkHTTP General Hooks
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
Hooks libboringssl.dylib to extract TLS keys and enables decryption of network traffic from iOS apps to be decrypted. Tested on iPhone 5s running iOS 12.4.2 jailbroken with Checkrain.
Logging tool that send Frida log to Mac NSLoggerViewer
Android Root-detection Bypass
Bypass Facebook SSL pinning on Android devices.
Universal Robust Advanced Root SSL Pinning Bypass this script cover most advance plus all possible test cases for root detection and ssl pinning bypass.
Look up the location of an iOS app on the device using the name displayed under the icon.
Script for geoposition and motion sensor activity forgery for pacer app
TLS/SSL pinning bypass for iOS 13
frida script for bypassing root detection implemented with rootbeer library - https://github.com/scottyab/rootbeer
Boilerplate for a CLI tool using frida-python