Substrate unloader
1 | 3K
Uploaded by: @mrmacete
Keep MobileSubstrate from injecting an iOS app (to be used with -f to take advantage of early instrumentation)
Keep MobileSubstrate from injecting an iOS app (to be used with -f to take advantage of early instrumentation)
iOS SSH diagnostics
TLS/SSL pinning bypass for iOS 13
Keep an eye on newly created objects in GNOME applications
Intercepts network traffic using Frida for specified target hosts, logging API calls and WebView URL loads. Currently supports okhttp3 only
Bypass Facebook SSL pinning on Android devices.
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Root detection phBank | showLoginPage() in checkifDeviceRooted()
Override MacBook charging smartness
Enable debugging option of webview for android applications to use the browser developer tools such as debugguer, console, network monitor. This script is useful when you need to set breakpoints and inspect the flow of an application.
Solution to FridaLab Android application
Secret diary of ninja's OkHTTP General Hooks
$ frida --codeshare masihyeganeh/re -f YOUR_BINARY
iOS application using WrapperUtil
add trace for binder call from binderproxy, use this feature to figure out which binder interface it calls
Bypass frida detection