Skip to content

Instantly share code, notes, and snippets.

@akabe1
akabe1 / frida_netsecconfig_bypass.js
Created October 7, 2021 10:25
An Android network security config pinning bypass
/* Android Network Security Config bypass script
by Maurizio Siddu
Run with:
frida -U -f [APP_ID] -l frida_netsecconfig_bypass.js --no-pause
*/
Java.perform(function(){
console.log('');
console.log('======');
@winstonma
winstonma / Onyx Boox Image Extractor.md
Last active May 28, 2024 05:20
Onyx Boox Image Extractor

Onyx Boox Image extractor

This extractor runs on debian linux and allows you to read the image content without owning an Onyx Boox device

Running the script

Please use a Debian based linux device to run the script. Please follow the steps below:

  • Open the the table of supported device on the browser, and find the MODEL column of your desired device
  • Open download.sh, and replace DEVICE_NAME with your name of your desired device
  • Run download.sh
@marcan
marcan / m1cat.c
Last active October 26, 2023 15:42
m1cat: a PoC for the M1RACLES covert channel vulnerability in the Apple M1
/*
* m1cat: a proof of concept for the M1RACLES vulnerability in the Apple M1.
*
* This program implements a covert channel that can be used to transmit data
* between two processes when run on the Apple Silicon "M1" CPUs.
*
* The channel is slightly lossy due to (presumably) the scheduler sometimes
* scheduling us on the wrong CPU cluster, so this PoC sends every byte twice
* together with some metadata/framing bits, which is usually good enough.
* A better approach would be to use proper FEC or something like that.
@jacopo-j
jacopo-j / frida-spoof.js
Last active February 11, 2025 15:00
Frida script to spoof and hide several Android identifiers
/* Utilities */
var RANDOM = function() {};
function _randomInt(min, max) {
return Math.floor(Math.random() * (max - min + 1)) + min;
}
function _randomHex(len) {
var hex = '0123456789abcdef';
@nathan130200
nathan130200 / setup.bat
Created July 13, 2019 12:09
Install all VSIX in current directory using windows batch file.
@echo off
set app="C:\Program Files (x86)\Microsoft Visual Studio\Installer\resources\app\ServiceHub\Services\Microsoft.VisualStudio.Setup.Service\VSIXInstaller.exe"
for /r %%f in (*.vsix) do (
call :setup "%%f"
)
goto end
:setup
@akabe1
akabe1 / frida_multiple_unpinning.js
Last active May 6, 2025 18:05
Another Android ssl certificate pinning bypass for various methods
/* Android ssl certificate pinning bypass script for various methods
by Maurizio Siddu
Run with:
frida -U -f <APP_ID> -l frida_multiple_unpinning.js [--no-pause]
*/
setTimeout(function() {
Java.perform(function() {
console.log('');
@akabe1
akabe1 / frida_universal_pinning_bypasser.js
Last active April 17, 2025 13:32
Another universal ssl certificate pinning bypass script for Android
/* Another universal ssl certificate pinning bypass script for Android
by Maurizio Siddu
Run with:
frida -U -f [APP_ID] -l frida_universal_pinning_bypasser.js --no-pause
*/
setTimeout(function() {
Java.perform(function() {
console.log('');
@Fmstrat
Fmstrat / HOOKS.md
Last active October 20, 2019 15:53
Unofficial documentation for hooks in TT-RSS
@AveYo
AveYo / .. MediaCreationTool.bat ..md
Last active May 16, 2025 01:02
Universal MediaCreationTool wrapper for all MCT Windows 10 versions - MOVED TO github.com/AveYo/MediaCreationTool.bat
@hfiref0x
hfiref0x / inject.c
Last active October 23, 2024 03:33
Process Doppelgänging
//
// Ref = src
// https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf
//
// Credits:
// Vyacheslav Rusakov @swwwolf
// Tom Bonner @thomas_bonner
//
#include <Windows.h>