abdol
0 | 309
Uploaded by: @abdolzx
sslpinning
sslpinning
changed offsed based on comments
Log requests and responses made using okhttp3.
6
Observe PIDs interacting with a given target process' UNIX sockets on i/macOS
aer
Fully bypass almost every (official) method of pinning requests. Works for system processes, applications, etc. Bypasses protections in AFNetworking, NSURLSession, TrustKit, Cordova, Security.framework, BoringSSL, and normal TLS.
Hide Root Detection From Various Apps
fer
testing bug
asdfsadf
test2
okhttp-log-root
2
How it works: - It registers a new WebAppInterface class, which contains the functions to be exported (example showToast) - It then hooks the Activity to obtain a valid context - It then hooks the WebView.loadUrl method, to add a context specific WebAppInterface instance - Lastly, it overrides the annotation checks and instructs that all requested methods are allowed to be requested.
This script hooks a variety of functions related to SSL/TLS implementations and socket operations across different libraries and platforms. When these functions are called, the script will: Log which function was called Show which module called it Display a detailed stack trace with module information . This should help you identify exactly where SSL/TLS operations are happening and which modules are responsible for certificate verification and secure communication.RetryClaude can make mistakes. Please double-check responses.