shadow
ssl-kill-switch2
Our great sponsors
shadow | ssl-kill-switch2 | |
---|---|---|
34 | 7 | |
701 | 2,981 | |
- | - | |
4.8 | 0.0 | |
2 months ago | 10 months ago | |
Logos | Objective-C | |
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
shadow
- [$15CAD][14.3] Jailbreak detection bypass for Clash of Clans.
- [Discussion] new work around for clash of clans?
- Any rootless tweaks that stops jailbreak detection in games?
- [Discussion] - Tweak list for Dopamine (rootless)
-
[Help] app error after Dopamine Jailbreak
Choicy is not able to bypass every app/game’s jb detection even for me, maybe you can try Shadow from jjolano repo. Although shadow does not support XinaA15, the developer says it should be functional. Shadow github I have no knowledge about any other jb detection bypassers as dopamine is my first jb🫠.
-
[help] how do I install the atria tweak..
https://lenglengyu.com/ https://acreson.github.io/mirror-rootless/ https://repo.alexia.lol/ http://apt.thebigboss.org/repofiles/cydia/ https://repo.chariz.com/ https://ellekit.space/ https://nahtedetihw.github.io/ https://frcoal.cfd/ https://havoc.app/ https://repo.icrazeios.com/ https://ios.jjolano.me/ https://johnnyb186.yourepo.com/ http://limneos.net/repo/ https://lizynz.github.io/ https://maxiwee.de/ https://repo.itznebbs.com/ https://opa334.github.io/ https://p2kdev.github.io/repo/ https://poomsmart.github.io/repo/ https://apt.procurs.us/ https://sparkdev.me/ https://tigisoftware.com/repo/ https://www.yourepo.com/
-
[Discussion] "Jailbreak is useless at this point" - A response from a hardcore tweak user
I think Shadow was recently created/updated so you should be good. Read any notes on the tweaks page in Sileo, Zebra etc. to see if there are listed compatibility issues and check the Tweaks GitHub page for deeper insights https://github.com/jjolano/shadow
-
[Request] Bypass Jailbreak detection for PSECU
use [[shadow]], works 100% https://ios.jjolano.me/
-
[Question] In the shadow tweak from jjolano, libhooker disappeared
Hope this helps. The repo I’m using is https://ios.jjolano.me/
-
[HELP] Suspicious dylib that I deleted from MobileSubstrate folder. Any Idea?
You can try using Shadow. https://github.com/jjolano/shadow
ssl-kill-switch2
- [$50][14.5.1][OPT] SSL Kill Switch / Bypass
- SSL Kill Switch / Bypass not working on 14.5.X
-
Is this networking knowledge enough ?
Another tip is looking at the source code of well-known tools that feature root/jailbreak/cert pinning bypasses like Objection, SSL Kill Switch 2, and Shadow to learn reverse engineering stuff.
- [Free Release] SSLUnpin
-
[$50][14] SSL Kill Switch 2 Update Needed
Sadly, the tweak (source: https://github.com/nabla-c0d3/ssl-kill-switch2) doesn't work on iOS 14 after installing (and calling Frida every time to disable Certificate Pinning is too annoying). Will gladly pay $50 to anyone that makes it work on A8 devices (I'm using iPad Mini 4) on iOS 14 (I'm using iOS 14.4.2). Thanks.
-
Clubhouse data leak: 1.3M user records leaked online for free
Jailbreaking an iPhone and using a tool like SSL Kill Switch [1] or just plain, old Frida with a script like [2] will do the job. Jailbreaking is the hard part, especially for an up to date iPhone, after that there's loads of guides you can follow that disable certificate validation for pretty much every application. It all boils down to hooking the necessary validation functions and having the APIs lie to the app code.
Some apps package their own crypto helpers (often with big crypto problems) to make this harder and require actual reverse engineering, but those are a pain to maintain and it's only a matter of time before someone finds a way around them. If you can extract the symbols (so if the app has not been obfuscated well) you can use Frida's API to hook those as well through any language you like. There's even an interactive Javascript console you can hook into the apps you're hooking!
Certificate pinning is a great way to protect users' security and privacy, especially in countries with questionable governments or ISPs, but it won't protect your app's secrets.
[1]: https://github.com/nabla-c0d3/ssl-kill-switch2
What are some alternatives?
Eneko - Set a video as your wallpaper
SSLUnpin - Bypass SSL pinning on iOS 8 to iOS 14
KernBypass-Public - chroot based kernel level jailbreak detection bypass.
SSLBypass - iOS SSL Pinning Bypass (iOS 8 - 14)
tiktok-god - 🎶 The best free & open source tweak for TikTok app on iOS
MonkeyDev - CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak.
RMS-Runtime-Mobile-Security - Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
IPAPatch - Patch iOS Apps, The Easy Way, Without Jailbreak.
Kumquat - Customize your iOS lockscreen player on iOS 14.2+
plcrashreporter - Reliable, open-source crash reporting for iOS, macOS and tvOS
Viva - Intuitive, live, iOS Homescreen layout configuration
objection - 📱 objection - runtime mobile exploration