Search Results for "root"

iOS Jailbreak Bypass

4 | 26K

Uploaded by: @incogbyte

Jailbreak bypass with Sileo/cydia and others paths, this script also tries to bypass common anti tampers, like ptrace, sysctl and getppid. This script DONT use resolver [** isJail**] and this script is not a silver bullet thanks :)

Android Multiple Pinning Bypass

1 | 4K

Uploaded by: @vichhka-git

This comprehensive Frida script bypasses over 30 different SSL pinning implementations, ranging from standard Java/Kotlin libraries (OkHttp, TrustKit) to native Flutter certificate verification. It works by forcing a "trust-all" state across nearly all modern Android networking stacks to allow seamless HTTPS traffic interception.

Bypass All Root Detection Methods

1 | 708

Uploaded by: @ravanmalik13

This script will bypass all root detection methods. Its included File.exists() Runtime.exec("su") Build.TAGS, FINGERPRINT RootDetectionActivity.isRooted() SystemProperties.get() XposedBridge detection Magisk detection RootBeer API hooks libc native su calls detection methods bypass.

freeRASP Root Detection Bypass

1 | 2K

Uploaded by: @sasasec

Bypasses multiple security controls in React Native applications protected with freeRASP by Talsec, including root detection, hooking detection, developer mode, and ADB checks.

Bypass Talsec RASP and Root Detection

1 | 5K

Uploaded by: @muhammadhikmahhusnuzon

This Frida script bypasses Talsec (FreeRASP) security mechanisms in Flutter-based Android applications by neutralizing the event reporting channel (talsec.app/freerasp/events), disabling root detection (via File and Runtime.exec), debugger checks (Debug.isDebuggerConnected), and exit/kill-based shutdowns (System.exit, Process.killProcess). Useful for dynamic analysis, reverse engineering, or testing protected apps in a controlled environment.

OneRule by h4rithd

1 | 3K

Uploaded by: @h4rithd

This script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com

Frida Combined Bypass Anti-Root Flutter TLS Pinning

0 | 79

Uploaded by: @fahad-source

This Frida script combines two runtime instrumentation techniques into a single payload for Android dynamic analysis. The first section installs an anti-root bypass that hooks Java APIs (PackageManager, File, Runtime.exec, SystemProperties, BufferedReader, ProcessBuilder) and native libc functions (fopen, system) to spoof or suppress indicators that detection routines look for, such as Magisk/SuperSu packages, su/busybox binaries, test-keys build tags, and getprop/mount/build.prop reads. The second section disables Flutter's TLS pinning by scanning the loaded Flutter library's executable memory for byte-pattern signatures of ssl_verify_peer_cert across multiple architectures (arm64, arm, x64, x86) and replacing the matched function with a NativeCallback that unconditionally returns 0. Together these bypasses let an analyst run a hardened Flutter app on a rooted device while transparently intercepting its HTTPS traffic through a proxy without triggering root detection or certificate validation failures. Install super proxy vpn app inside the emulator configure http proxy the run the script. check burp you will be able to see the burp requests.

Android Play Store Integrity Bypass

0 | 396

Uploaded by: @kalinux568

Description: This Frida script bypasses Google Play protection mechanisms in Android applications, including installer verification, Play Integrity checks, and forced redirection to the Play Store. It prevents application termination by hooking methods such as Activity.finish(), System.exit(), and Process.killProcess(). The script also includes root and emulator detection bypass techniques along with WebView monitoring to support dynamic analysis during mobile application penetration testing. Created by Rohit Sharma | LinkedIn: https://www.linkedin.com/in/r0x5r/

iOS Protections Bypass

0 | 623

Uploaded by: @AhmedGamal0011

This Frida script was developed by Ahmed Gamal – ZeroSploit MEA to dynamically bypass multiple popular iOS jailbreak detection frameworks during runtime analysis and mobile application security testing. The script targets and neutralizes detection logic implemented in the following frameworks: DTTJailbreakDetection.framework IOSSecuritySuite.framework jailbreak_root_detection.framework safe_device.framework

Bypass JailMonkey Jailbreak Detection in iOS Apps Frida Script

0 | 1K

Uploaded by: @fahad-source

The script returns false/failure for checks on ~50 jailbreak-related paths including Cydia, Sileo, Zebra, substrate libraries, and various jailbreak tool artifacts (checkra1n, palera1n, unc0ver, etc.) 1. JailMonkey - A React Native library that detects jailbroken devices. The script hooks methods like isJailBroken, checkPaths, checkSchemes, checkDylibs, etc. 2. Native iOS APIs - System-level detection methods: - NSFileManager - File existence checks for jailbreak artifacts - UIApplication canOpenURL: - URL scheme checks (cydia://, sileo://, etc.) - C functions: stat, lstat, access - Low-level file checks 3. Anti-debugging measures - Hooks sysctl to remove the P_TRACED flag (0x800) 4. UIAlertController - Blocks jailbreak warning dialogs from being displayed

Universal Android Security Bypass Root SSL Play Protect

0 | 2K

Uploaded by: @sv110040

This is a comprehensive, all-in-one Frida script designed for security researchers and authorized penetration testers. It aims to streamline the dynamic analysis process by neutralizing multiple layers of client-side security often found in modern production Android applications.

Universal Android Security Bypass Suite UASBS v1 Full Mobile Defense Disabler

0 | 0

Uploaded by: @khaledealrefaee

An advanced Frida-based Android security bypass suite for authorized penetration testing and red teaming engagements. It dynamically detects and disables all major security defenses found in mobile applications, including: • Root Detection (RootBeer, API-based, file-based, system property, etc.) • Emulator Detection (QEMU, LDPlayer, Bluestacks, Nox, etc.) • Debugger Detection (TracerPid, isDebuggerConnected, ADB flags) • Frida Detection (stack traces, process names, TCP ports, etc.) • SSL Pinning (TrustManager, OkHttp, TrustKit, WebView) • Play Integrity / SafetyNet Bypass • VPN & External Storage Detection • Biometric & Screen Lock Checks • Tamper Detection (signature, DEX, package checks) • Firebase, Retrofit, Cronet, and Firestore Communications • RealDevice / DevelopmentMode / System Properties • Dynamic Discovery & Enumeration of suspicious classes/methods Includes dynamic scanning, OPSEC-safe stealth modes, verbose logging, automatic method bypassing, and coverage for both Java and native layers. **Created by:** Khaled Al-Refaee (Ozex) **Version:** 4.0 **Date:** 2025 **Legal Use:** For licensed penetration testing, mobile app red teaming, and professional security research.

JailMonkey-bypass

0 | 3K

Uploaded by: @h4rithd

This script dynamically instruments Android applications using Frida to bypass multiple security layers, including root detection, emulator detection, ADB/debugger checks, and JailMonkey anti-tampering mechanisms.

bypassRootAndSSLPinning

0 | 2K

Uploaded by: @paragbagul111

This project involved bypassing root detection and SSL pinning in a mobile application. I combined two separate scripts, sourced from GitHub—one for bypassing root detection and the other for bypassing SSL pinning—into a single solution, allowing me to bypass both security mechanisms simultaneously.

IOS Application Information

0 | 2K

Uploaded by: @SecFathy

IOS Application Information like application analyzer and memory dumper providing real-time inspection of app information, file system access, memory analysis, and runtime data extraction with an intuitive colored command-line interface

Il2CppHookScripts

0 | 14K

Uploaded by: @axhlzy

Dynamically parsing Android il2cpp, using export methods to help us quickly analyze game logic, type resolution ... @ https://github.com/axhlzy/Il2CppHookScripts

iOS Jailbreak Bypass

0 | 0

Uploaded by: @rodnt

Bypass the commonly used root techniques designed for simple apps, intended for testing purposes. Strong Runtime Application Self-Protection (RASP) will detect this easily.

hide from isEmulator hasBusyBox rooted

0 | 1K

Uploaded by: @sosacrazy126

added a new feature to check if the device is an emulator (isEmulator) and another feature to check if BusyBox is installed (hasBusyBox). Additionally, I added a new method (logInfo) to log information. Make sure to replace the placeholder logic with actual implementation details based on your needs. Adjust the logic in isEmulator and hasBusyBox to perform accurate detection.

ANTI-ROOT-AND-SSL-PINNING2

0 | 532

Uploaded by: @vicsanjinez

Based on the project https://codeshare.frida.re/@limyout/root-detection-and--ssl-pinning/ with a little modification for an error with "Error: getPackageInfo(): has more than one overload, use .overload(<signature>) to choose from: .overload('android.content.pm.VersionedPackage', 'int') .overload('java.lang.String', 'int')"

android-x64-strace

0 | 4K

Uploaded by: @FrenchYeti

Syscall tracing & args/flags/error/signal parsing with strace-like output for Android x64 (tested with emulator & Android 13). See more at https://github.com/FrenchYeti/interruptor