Skip to content

Instantly share code, notes, and snippets.

@g2asell2019
g2asell2019 / BotcheckActor.js
Created February 28, 2024 10:17 — forked from prescience-data/BotcheckActor.js
Puppeteer bot detection tests
/** namespace App\Actors **/
const Actor = require('./Actor');
class BotcheckActor extends Actor {
platform = 'botcheck';
constructor(env) {
const config = require('../../config/actors/botcheck');
@g2asell2019
g2asell2019 / converter.rb
Created January 30, 2023 16:07 — forked from ttilberg/converter.rb
Utilities to unobfuscate a certain class of js files.
require 'net/http'
require 'json'
require 'uri'
require 'yaml'
##
# Make a certain obfuscated js less obnoxious to analyze.
#
class Obfuscated
attr_accessor :script
@g2asell2019
g2asell2019 / tips.md
Created December 12, 2021 10:53 — forked from danylokos/tips.md
Debugging 3rd party apps on iOS and Android

Debugging 3rd party apps on iOS and Android

Part I: iOS

Prerequisites

  • checkra1n
    • A7 - A10 devices (iPhone 5s - iPhone X), iOS 12.0+
    • Dropbear SSH, port 44, root:alpine
  • USB multiplexing daemon usbmuxd (available via brew)
  • Use scp to copy file to/from device

Forward remote (iDevice) port 44 (Dropbear SSH) to local (Mac) 2222

@g2asell2019
g2asell2019 / ios14-certificate-pinning-bypass.md
Created December 12, 2021 10:50 — forked from AkdM/ios14-certificate-pinning-bypass.md
iOS 14 app TLS decrypt / certificate pinning bypass steps

This is not a tutorial, just a small guide to myself but feel free to get some infos here.

Working on an iPhone 7 running iOS 14.5.1

  1. Jailbreak an iPhone/iPad/whatever

  2. If necessary, you'll need to bypass Jailbreak detection for some apps with tweaks like A-Bypass, Hestia, HideJB, etc.

  3. Get the PID of the app you want to capture traffic from with frida-ps -Ua ( a is for showing running apps only, you can -U to show all running processes instead)