Fridaantiroot
1 | 3K
Uploaded by: @khoomelvin
Root
Root
Change various Android Device Characteristics in order to return a Log4J payload
iOS application using WrapperUtil
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
Automatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor.app/Contents/MacOS/010\ Editor --no-pause
Android Root-detection Bypass
Flutter, OkHTTPv3, HttpsURLConnection, TrustKit universal SSL unpinner for Android.
This Code is running and bypassing latest okhttp3 with obfuscated code.
Script to instantly display current tab URL on Chrome Android (Suitable for fast URL capturing). Buy me a coffee: https://www.buymeacoffee.com/raphaelQ
dump Objective C classes hierarchy
Totally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
Look up the location of an iOS app on the device using the name displayed under the icon.
The secret diary of ninja scripts' regarding TextView General Hooking
Trace invocations of the RegisterNatives JNI API, to identify native functions registered from within native code on runtime
Disables jailbreak detection in the Vipps app
Print all SQL queries executed from android sqlite, and sqlcipher