fridantiroot
53 | 185K
Uploaded by: @dzonerzy
Android antiroot checks bypass
Android antiroot checks bypass
Frida Multiple Bypass (SSL Pinning + Root DEtection + Emulator Detection )
Bypass antiroot detection for Xamarin apps!
Jailbreak detection bypass with a wordlist specific to Palera1n jailbreak.
Jailbreak bypass with Sileo/cydia and others paths, this script also tries to bypass common anti tampers, like ptrace, sysctl and getppid. This script DONT use resolver [** isJail**] and this script is not a silver bullet thanks :)
Strace by Frida: prints system calls (SVC) and parses args/flags/errors. More at https://github.com/FrenchYeti/interruptor
Script for interacting with content providers
Simple Script to make Android Toast works with Remote + Non-Rooted Device
https://www.notsosecure.com/instrumenting-native-android-functions-using-frida/
android 15 root , tiktok v44.9.3
This is the script which include ssl pinning bypass also please use deepseek ai to modified based on your error or output.
Advanced root detection bypass (under dev and testted on Frida 17.2.6)
Improved version of the script originally uploaded by @dzonerzy ; modified to bypass emulator detection
Frida script for bypassing React Native Jail Monkey checks
This script has various Jailbreak detection bypass techniques.
Root Detection Bypass
new one s
This comprehensive Frida script bypasses over 30 different SSL pinning implementations, ranging from standard Java/Kotlin libraries (OkHttp, TrustKit) to native Flutter certificate verification. It works by forcing a "trust-all" state across nearly all modern Android networking stacks to allow seamless HTTPS traffic interception.
block_playstore
Frida script to bypass RootBeer root detection and SSL pinning in OkHttp, TrustManager, HttpsURLConnection, and WebView. Includes request/response logging.
This script will perform to bypass most of the restriction like root, integrity checks. Kindly replace the app package name and use deepseek ai.
This script will bypass all root detection methods. Its included File.exists() Runtime.exec("su") Build.TAGS, FINGERPRINT RootDetectionActivity.isRooted() SystemProperties.get() XposedBridge detection Magisk detection RootBeer API hooks libc native su calls detection methods bypass.
This script helps to bypass the iOS jailbreak detection. This project is forked from /@DevTraleski/ios-jailbreak-detection-bypass-palera1n/
Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.
This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.
Universal Robust Advanced Root SSL Pinning Bypass this script cover most advance plus all possible test cases for root detection and ssl pinning bypass.
bypass jailbreak plus ssl check ios 16
This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
Bypass some functions of the Gantix Jail Monkey package
Bypasses jailbreak detection in any "React-Native" app that relies on the 'jail-monkey' library for it's jailbreak detection.
TEST FOR BYPASS
Combination of fridaantiroot and universal android ssl pinning bypass 2
Root detection bypass for Cyberkatze IRoot https://github.com/WuglyakBolgoink/cordova-plugin-iroot
frida script for bypassing root detection implemented with rootbeer library - https://github.com/scottyab/rootbeer
Root detection phBank | showLoginPage() in checkifDeviceRooted()
Android Root-detection Bypass
Root
Modified version of https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
dump Objective C classes hierarchy
This Frida script combines two runtime instrumentation techniques into a single payload for Android dynamic analysis. The first section installs an anti-root bypass that hooks Java APIs (PackageManager, File, Runtime.exec, SystemProperties, BufferedReader, ProcessBuilder) and native libc functions (fopen, system) to spoof or suppress indicators that detection routines look for, such as Magisk/SuperSu packages, su/busybox binaries, test-keys build tags, and getprop/mount/build.prop reads. The second section disables Flutter's TLS pinning by scanning the loaded Flutter library's executable memory for byte-pattern signatures of ssl_verify_peer_cert across multiple architectures (arm64, arm, x64, x86) and replacing the matched function with a NativeCallback that unconditionally returns 0. Together these bypasses let an analyst run a hardened Flutter app on a rooted device while transparently intercepting its HTTPS traffic through a proxy without triggering root detection or certificate validation failures. Install super proxy vpn app inside the emulator configure http proxy the run the script. check burp you will be able to see the burp requests.
Description: This Frida script bypasses Google Play protection mechanisms in Android applications, including installer verification, Play Integrity checks, and forced redirection to the Play Store. It prevents application termination by hooking methods such as Activity.finish(), System.exit(), and Process.killProcess(). The script also includes root and emulator detection bypass techniques along with WebView monitoring to support dynamic analysis during mobile application penetration testing. Created by Rohit Sharma | LinkedIn: https://www.linkedin.com/in/r0x5r/
dsads
fixx
better one
This Frida script was developed by Ahmed Gamal – ZeroSploit MEA to dynamically bypass multiple popular iOS jailbreak detection frameworks during runtime analysis and mobile application security testing. The script targets and neutralizes detection logic implemented in the following frameworks: DTTJailbreakDetection.framework IOSSecuritySuite.framework jailbreak_root_detection.framework safe_device.framework
root-ssl
The script returns false/failure for checks on ~50 jailbreak-related paths including Cydia, Sileo, Zebra, substrate libraries, and various jailbreak tool artifacts (checkra1n, palera1n, unc0ver, etc.) 1. JailMonkey - A React Native library that detects jailbroken devices. The script hooks methods like isJailBroken, checkPaths, checkSchemes, checkDylibs, etc. 2. Native iOS APIs - System-level detection methods: - NSFileManager - File existence checks for jailbreak artifacts - UIApplication canOpenURL: - URL scheme checks (cydia://, sileo://, etc.) - C functions: stat, lstat, access - Low-level file checks 3. Anti-debugging measures - Hooks sysctl to remove the P_TRACED flag (0x800) 4. UIAlertController - Blocks jailbreak warning dialogs from being displayed
This is a comprehensive, all-in-one Frida script designed for security researchers and authorized penetration testers. It aims to streamline the dynamic analysis process by neutralizing multiple layers of client-side security often found in modern production Android applications.
androidSSLUnpinning
emu and ssl
ByPass universal Root detection RootBeer for hooking with frida
emulator-bypass-detect
ARABE ALL BYPASS
Arabe Bypass - SSL - ROOT - EMULATOR DETECTION
root detection checker
flutter root ssl check
multiple-r00t-checker
ssl, root detection verification
This script will perform to bypass most of the restriction like root, integrity checks. Kindly replace the app package name and use deepseek ai.
This is the script which include ssl pinning bypass also please use deepseek ai to modified based on your error or output.
ROOTBY
Advanced SSL/TLS Certificate Pinning Bypass Script
a simple code to block root checking function
An advanced Frida-based Android security bypass suite for authorized penetration testing and red teaming engagements. It dynamically detects and disables all major security defenses found in mobile applications, including: • Root Detection (RootBeer, API-based, file-based, system property, etc.) • Emulator Detection (QEMU, LDPlayer, Bluestacks, Nox, etc.) • Debugger Detection (TracerPid, isDebuggerConnected, ADB flags) • Frida Detection (stack traces, process names, TCP ports, etc.) • SSL Pinning (TrustManager, OkHttp, TrustKit, WebView) • Play Integrity / SafetyNet Bypass • VPN & External Storage Detection • Biometric & Screen Lock Checks • Tamper Detection (signature, DEX, package checks) • Firebase, Retrofit, Cronet, and Firestore Communications • RealDevice / DevelopmentMode / System Properties • Dynamic Discovery & Enumeration of suspicious classes/methods Includes dynamic scanning, OPSEC-safe stealth modes, verbose logging, automatic method bypassing, and coverage for both Java and native layers. **Created by:** Khaled Al-Refaee (Ozex) **Version:** 4.0 **Date:** 2025 **Legal Use:** For licensed penetration testing, mobile app red teaming, and professional security research.
Frida
Self use
Bypass for jailbreak/root detection of the freeRASP library. Works on Android and iOS. Based on the work of https://github.com/rodolfomarianocy
A refactored and streamlined Frida script to bypass root detection checks implemented by the RootBeer library.
asd
This script bypass emulator and ssl pinning
Possible root detection file check
File exists check
This script dynamically instruments Android applications using Frida to bypass multiple security layers, including root detection, emulator detection, ADB/debugger checks, and JailMonkey anti-tampering mechanisms.
bypass
y5er
Latest Scottyab Root bypass
X
This project involved bypassing root detection and SSL pinning in a mobile application. I combined two separate scripts, sourced from GitHub—one for bypassing root detection and the other for bypassing SSL pinning—into a single solution, allowing me to bypass both security mechanisms simultaneously.
Script to bypass Frida detection
test
bypassroot
Only for Uncrackable L1.
This Frida script bypasses both root detection and SSL pinning mechanisms in Android applications.
Combines root and debugger bypasses in one script.
IOS Application Information like application analyzer and memory dumper providing real-time inspection of app information, file system access, memory analysis, and runtime data extraction with an intuitive colored command-line interface
Not mine, tryna fix a bug
test
This script hooks into a function called IsDrived() which contains several private function.
This script traces functions typically related to vm and root detection to find what you need to hook to bypass root detection.
test root detection
Credit By : @JockerNetVIP
Intercepts all calls from the RootBeer library that might indicate a rooted device
risingstar-androbypass
DanielTesting
root detection bypass
Bypas
Dynamically parsing Android il2cpp, using export methods to help us quickly analyze game logic, type resolution ... @ https://github.com/axhlzy/Il2CppHookScripts
Universal Root Detection and SSL Pinning Bypass
rootbypass to uncrackable1 apk
Bypass the commonly used root techniques designed for simple apps, intended for testing purposes. Strong Runtime Application Self-Protection (RASP) will detect this easily.
added a new feature to check if the device is an emulator (isEmulator) and another feature to check if BusyBox is installed (hasBusyBox). Additionally, I added a new method (logInfo) to log information. Make sure to replace the placeholder logic with actual implementation details based on your needs. Adjust the logic in isEmulator and hasBusyBox to perform accurate detection.
t1
root and sslpinning
Configures SSHd to 22/tcp port
trying stuff out
Bypass Root Detection
Work with flutter based app to
change upsidedown cake cert root
Bypass root detection android for plugins cyberkatze iroot
Based on the project https://codeshare.frida.re/@limyout/root-detection-and--ssl-pinning/ with a little modification for an error with "Error: getPackageInfo(): has more than one overload, use .overload(<signature>) to choose from: .overload('android.content.pm.VersionedPackage', 'int') .overload('java.lang.String', 'int')"
ssl
okhttp-log-root
Anti Root script put together with SSL Bypass script
Syscall tracing & args/flags/error/signal parsing with strace-like output for Android x64 (tested with emulator & Android 13). See more at https://github.com/FrenchYeti/interruptor
a test
asg23
my custom ssl cert path for unpinning
Hide Root Detection From Various Apps
rootbypass
The below script can bypass multiple root detection libraries
test4
test3
test2
test
combines 2 bypasses
s
sdsdsd
e
e
by[ass
test
root detection and SSL pinning
pin ssl
Xamarin Root Detect Bypass
objection agents test