jnitrace
Trace the JNI API in Android apps.
View ScriptBrowse 439 Frida scripts for iOS and Android reverse engineering, security research, and mobile app analysis.
Trace the JNI API in Android apps.
View ScriptiOS Jailbreak Detection Bypass tested on iOS 13
View ScriptObserve file system accesses by hooking some java.io.File* classes and methods, libc open/read functions and try to resolve associtation between file descriptor and path. Optionally, it can dumps the ...
View ScriptiOS通用脱壳脚本 dumpdecrypted with frida to dump iOS encrypted binary
View ScriptBypass antiroot detection for Xamarin apps!
View Scriptbypass mostly common android ssl pinning method
View ScriptImplementation of Okhttp3 network interceptor
View ScriptList iOS file data protection classes (NSFileProtectionKey) of an app
View Scriptfind android hook: inline hook/got hook/java hook
View ScriptUse this frida script to bypass all SSL checks
View ScriptLibc-based anti-frida bypass (strstr)
View ScriptDevelopers of Android applications usually tend to add additional "protection" (e.g. AES encryption) to their proprietary communication protocols, or to encrypt local files in order to hide some sensi...
View ScriptShow useful info about AES encryption/decryption at application runtime
View ScriptObserve all method calls to a specific class (e.g. observeClass('LicenseManager')) , or dynamically resolve methods to observe using ApiResolver (e.g. observeSomething('*[* *Password:*]')). The script...
View ScriptFind out which functions are called by a given function on the next call
View ScriptFrida Multiple Bypass (SSL Pinning + Root DEtection + Emulator Detection )
View ScriptAndroid antiroot checks bypass
View ScriptAnother Android ssl certificate pinning bypass script for various methods (https://gist.github.com/akabe1/5632cbc1cd49f0237cbd0a93bc8e4452)
View ScriptAndroid SSL Re-Pinning, more information can be found here https://techblog.mediaservice.net/2017/07/universal-android-ssl-pinning-bypass-with-frida/
View Script