Read Me
Read Me
Read Me
8888888888
8888b 888 Y8P Y8P 888 d88P Y88b
888
88888b 888 888 888 888
888
888Y88b 888 888 88888b. 8888 888 888 888888 .d8888b 888 888 888
8888888
888 Y88b888 888 888 "88b "888 888 888 888 88K 888 888 888
888
888 Y88888 888 888 888 888 888 888 888 "Y8888b. 888 888 888 888
888
888 Y8888 888 888 888 888 Y88b 888 Y88b. X88 Y88b 888 Y88b d88P
888
888 Y888 888 888 888 888 "Y88888 "Y888 88888P' "Y88888 "Y8888P"
8888888888
888
d88P
888P"
# Authored By : Hasan
# Version : 1.0
# Date : 05/2020
# Ninjutsu is Penetration Testing & Red Teaming distribution
# Community :
# Github : https://github.com/Ninjutsu-OS/Ninjutsu
# Twitter : @ninjutsu_os
# Telegram: https://t.me/Ninjutsu_os
# Discord : https://discord.gg/wUBybfG
# If you feel like showing your love and/or appreciation for this project, then how
about shouting me a coffee or Pizza :) Buy Me A Coffe
# https://www.buymeacoffee.com/ninjutsu
# https://www.paypal.me/ninjutsuos
SQLExpress :
Password : toor
OR Open CMD and run this command below to coorect port to connect :
frida-ps -U
# output command :
C:\Users\<User>\>frida-ps -U
PID Name
---- ------------------------------------
1734 adbd
5582 android.ext.services
5647 android.process.acore
5853 android.process.media
4633 audioserver
4629 cameraserver
5781 com.android.carrierconfig
5831 com.android.externalstorage
5758 com.android.inputservice
5612 com.android.keychain
5915 com.android.managedprovisioning
5930 com.android.onetimeinitializer
5385 com.android.phone
5953 com.android.providers.calendar
Directory of C:\ProgramData\Mr.Robot\Win-Tools\frida
aesinfo.js
find-android-hook.js
jnitrace.js
android-certificate-pinning-bypass.js
frida-android-unpinning-ssl.js
network-security-config-bypass.js
android-debug-mode-bypass.js
frida-multiple-unpinning.js
okhttp3-interceptor.js
android-list-loaded-classes.js
frida_universal_pinning_bypasser.js
universal-ssl-check-bypass.js
anti-frida-bypass.js
fridantiroot.js
universal-ssl-check-bypass2.js
fiddler-4-ssl-pinning-bypass.js
fridascript.js
# Drozer :
run drozer agen and switch butoon to on then type following command :
# adb forward tcp:31415 tcp:31415
# drozer console connect
https://restoreprivacy.com/vpn-test/
https://www.bestvpn.co/guides/vpn-leak-test/
https://dnsleak.com/
https://restoreprivacy.com/go/perfect-privacy-ip-check
https://ipleak.net/
https://adguard.com/en/welcome.html
https://www.dnsleaktest.com/
https://browserleaks.com/dns
https://www.expressvpn.com/dns-leak-test
https://cryptoip.info/dns-leak-test