force open wechat xLog
open wechat xlog, so we can see logs in logcat
View ScriptBrowse 438 Frida scripts for iOS and Android reverse engineering, security research, and mobile app analysis.
open wechat xlog, so we can see logs in logcat
View Scriptcombines 2 bypasses
View Scriptcapturing-and-decrypting-https-traffic-from-ios-apps-using-frida
View Scripthopefully works haha
View ScriptSwift 4.0, iOS, AARCH64 -- see https://github.com/maltek/swift-frida/blob/master/examples/no_pinning_alamofire.js
View ScriptHook a C function and print out the params
View Scriptmy test project
View Scriptget keys
View ScriptAnti Root script put together with SSL Bypass script
View Scripthttprect
View ScriptThis Frida script bypasses both root detection and SSL pinning mechanisms in Android applications.
View ScriptEnumerate code execution in app
View ScriptThis script will add HttpLoggingInterceptor at OkHttpClient, so the HttpLoggingInterceptor will print all requests and responses.
View ScriptA Frida script that hijacks -[CLLocation coordinate] and returns spoofed GPS coordinates. It exposes simple movement helpers (right, left, up, down) that move the spoofed position by a configurable di...
View ScriptIntercepts OkHttp3 requests redirects them to tls.peet.ws and prints the response.
View ScriptCode to dump symmetric key bytes from Swift apps on iOS using SymmetricKey by hooking the constructor
View ScriptFrida script to see how payload encrypted before send to server
View ScriptSupportSQLiteStatement logger
View ScriptDumper
View ScriptRebase of an existing script. Created for personal use.
View Script