Android Monitor Implicit Intents
0 | 658
Uploaded by: @sdcampbell
This script monitors Android implicit intents. For use in testing "MASTG-TEST-0026: Testing Implicit Intents"
This script monitors Android implicit intents. For use in testing "MASTG-TEST-0026: Testing Implicit Intents"
This project involved bypassing root detection and SSL pinning in a mobile application. I combined two separate scripts, sourced from GitHub—one for bypassing root detection and the other for bypassing SSL pinning—into a single solution, allowing me to bypass both security mechanisms simultaneously.
e
TLS fingerprinting hook try
Intercept Crypto
added a new feature to check if the device is an emulator (isEmulator) and another feature to check if BusyBox is installed (hasBusyBox). Additionally, I added a new method (logInfo) to log information. Make sure to replace the placeholder logic with actual implementation details based on your needs. Adjust the logic in isEmulator and hasBusyBox to perform accurate detection.
test
logall
bypass jailbreak
trace HTTP POST and UDP calls with request and response data
Bypass SSL certificate validation for the injected app on iOS 12
X
Bypass SSL-Pinning Thanks to "pcipolloni"
IOS Application Information like application analyzer and memory dumper providing real-time inspection of app information, file system access, memory analysis, and runtime data extraction with an intuitive colored command-line interface
use StrictMode.noteSlowCall to mark common slow binder call on main thread(IActivityManager, IPackageManager, IConnectivityManager)
Hooking the createVirtualDisplay