Frida — SSL Pinning Bypass
Common Information
Type Value
UUID d55d5305-2559-4394-a7ed-adcabb2dc006
Fingerprint eac6bc10b3686208
Analysis status DONE
Considered CTI value 0
Text language
Published Sept. 9, 2024, 4:04 p.m.
Added to db Sept. 9, 2024, 6:14 p.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline Frida — SSL Pinning Bypass
Title Frida — SSL Pinning Bypass
Detected Hints/Tags/Attributes 23/1/30
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 172 Reverse Engineering on Medium https://medium.com/feed/tag/reverse-engineering 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 1
libliger.so
Details Domain 138
java.io
Details Domain 52
android.app
Details Domain 1
library.name
Details Domain 4
com.android.org
Details Domain 11
javax.net
Details Domain 3
ljavax.net
Details Domain 37
java.security
Details Domain 1
sslcontextinit.call
Details Domain 219
gist.github.com
Details Domain 17
com.instagram.android
Details Domain 4128
github.com
Details Domain 121
portswigger.net
Details Domain 3
www.genymotion.com
Details File 1
1-android-x86_64.xz
Details File 1
instagram.js
Details File 364
console.log
Details File 24
util.log
Details File 4
java.reg
Details File 4
sslcontext.ini
Details File 6
ssl.key
Details File 1
ssl-pinning.js
Details Github username 1
mt-ks
Details Github username 7
frida
Details md5 1
80ea78f919bfe31538aba9f9eade714c
Details IPv4 81
192.168.1.100
Details Url 1
https://gist.github.com/mt-ks/80ea78f919bfe31538aba9f9eade714c
Details Url 2
https://github.com/frida
Details Url 11
https://portswigger.net/burp
Details Url 2
https://www.genymotion.com