0 | 89
Android malware hides actions like data theft, SMS interception, shell commands, and camera misuse. Our Frida-based script hooks sensitive APIs and decodes parameters at runtime, revealing clear high-level behaviors. This helps forensic analysts accurately reconstruct the malware’s true impact.
0 | 1K
This is solution script for FridaLab Challenge(https://rossmarks.uk/blog/fridalab/).
0 | 116
multiple-r00t-checker
0 | 1K
hook javascript interfaces
0 | 2K
Rebase of an existing script. Created for personal use.
0 | 3K
This script would bypass the scripts when the exception handling is not done properly in Biometric Authentication functions.Script Courtesy - F-secure-Labs.
0 | 14K
Update for the F-secure Lab Script Android 11
0 | 146
Hooks sqlite3_prepare, sqlite3_prepare_v2, sqlite3_prepare_v3, sqlite3_prepare16, sqlite3_prepare16_v2, sqlite3_prepare16_v3
0 | 3K
Script to bypass Frida detection
0 | 3K
Uploaded by: @SYM01
Disable SSL certificate check for iOS app.
0 | 6K
objection agents test
0 | 228
TraceDlopen
0 | 101
This Frida script hooks into Apple’s CoreLocation framework to simulate a moving GPS location on iOS apps. It intercepts CLLocationManager methods and continuously delivers fake location updates that appear as if the device is walking randomly within a defined area.
0 | 2K
1
0 | 548
Latest Scottyab Root bypass
0 | 3K
Created for personal use.