Android Native Log
2 | 2K
Uploaded by: @luoyesiqiu
Use liblog.so output log
Use liblog.so output log
Keep MobileSubstrate from injecting an iOS app (to be used with -f to take advantage of early instrumentation)
Bypass frida detection
Check for interesting string comparison
Boilerplate for a CLI tool using frida-python
get child's process id of fork
Spoof location in iOS application
Enable debugging option of webview for android applications to use the browser developer tools such as debugguer, console, network monitor. This script is useful when you need to set breakpoints and inspect the flow of an application.
Rebase of an existing script. Created for personal use.
Printing information about CCCrypt calls
Este script Frida intercepta as classes IvParameterSpec e SecretKeySpec em Java para capturar e registrar vetores de inicialização (IV) e chaves secretas usados em operações de criptografia. Ele converte esses valores em strings hexadecimais e os exibe no console, evitando repetições.
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
Bypass Facebook SSL pinning on Android devices.
Functions and classes that help you in hooking some Swift functions
Disable pinning by patching SecTrustEvaluate
bypass SSL Pinning TIKTOK