Skip to content

Instantly share code, notes, and snippets.

View rodnt's full-sized avatar
:shipit:
see no evil ~ learning..

Rodolfo Tavares - (opcod3r) rodnt

:shipit:
see no evil ~ learning..
View GitHub Profile
@AkdM
AkdM / ios14-certificate-pinning-bypass.md
Last active April 13, 2024 00:14
iOS 14 app TLS decrypt / certificate pinning bypass steps

This is not a tutorial, just a small guide to myself but feel free to get some infos here.

Working on an iPhone 7 running iOS 14.5.1

  1. Jailbreak an iPhone/iPad/whatever

  2. If necessary, you'll need to bypass Jailbreak detection for some apps with tweaks like A-Bypass, Hestia, HideJB, etc.

  3. Get the PID of the app you want to capture traffic from with frida-ps -Ua ( a is for showing running apps only, you can -U to show all running processes instead)

@r3ggi
r3ggi / flutter-ios-keyboard-cache.js
Created May 11, 2022 12:04
Flutter keyboard cache verifier - Frida script for iOS
// Flutter keyboard cache verifier - Frida script for iOS
// Script based on https://codeshare.frida.re/@ay-kay/ios-custom-keyboard-support/
function resolveAutocorrectionType(typeNr) {
switch (parseInt(typeNr, 10)) {
case 1:
return "UITextAutocorrectionTypeNo"
break;
case 2:
return "UITextAutocorrectionTypeYes"
@tihmstar
tihmstar / iPhone_8_15.1_19B74_kernelpatches.txt
Last active April 18, 2024 23:16
iPhone 8 15.1 19B74 checkm8 jb patches
iPhone8 15.1 19B74
iBoot: 0x1800309c0 : 000080d2
iBoot: 0x180038744 : af070094
iBoot: 0x18003a844 : 9386ff17
iBoot: 0x18001c290 : a1000058df0301eb40000054202080d2c0035fd6
iBoot: 0x18001c2a4 : 4887038001000000
iBoot: 0x1800325dc : 200080d2
iBoot: 0x18009127f : 7261316e736e3077206d6f6465
iBoot: 0x180038f04 : 1f2003d5