Anti Frida Bypass
Bypass frida detection
View ScriptBrowse 440 Frida scripts for iOS and Android reverse engineering, security research, and mobile app analysis.
Bypass frida detection
View ScriptTotally inefficient, client-side toy parser for Stalker events. It's mostly useful for exploring and debugging the Stalker.
View ScriptFunctions and classes that help you in hooking some Swift functions
View ScriptDecrypt AES doFinal
View ScriptCode to enable Web View debugging in Hybrid apps. Buy me a coffee: https://www.buymeacoffee.com/raphaelQ
View ScriptBay pat Facebook
View Script列出手机上安装的应用
View ScriptAutomatic Magic Code Locating 010 Editor App for macOS Loader(Bypass License Patcher) Created by B.S. Usage: frida --codeshare iDone/automatic-magic-code-locating-loader -f /Applications/010\ Editor...
View ScriptDisable pinning by patching SecTrustEvaluate
View ScriptCombination of fridaantiroot and universal android ssl pinning bypass 2
View ScriptSpoof location in iOS application
View ScriptTCP Dump iOS 14
View ScriptFrida script to bypass Android’s FLAG_SECURE protection, allowing screenshots and screen recording in apps that normally block them. #Android, #Frida, #FLAG_SECURE, #screenshot, #screen_recording, #by...
View ScriptFrida script to bypass freeRASP React Native for iOS apps ;P
View ScriptLogging tool that send Frida log to Mac NSLoggerViewer
View ScriptThis script dynamically instruments Android applications using Frida to bypass all security checks, root detection, debugger detection, ssl pinning, and alter network information. | by h4rithd.com
View Scripttest code frida
View ScriptBypass frida detection
View Scriptadd trace for binder call from binderproxy, use this feature to figure out which binder interface it calls
View ScriptiOS application using WrapperUtil
View Script