This script bypasses iOS freeRASP security framework by intercepting the main initialization method talsecStart:withResolver:withRejecter: and replacing it with an empty function.
frida -U -f <bundle_identifier> -l freerasp-bypass-ios.jsfrida --codeshare 0tax00/ios-freerasp-bypass -f YOUR_BINARYfrida -U -f com.example.appObject.keys(ObjC.classes).filter(name =>
name.toLowerCase().includes('freerasp') ||
name.toLowerCase().includes('talsec') ||
name.toLowerCase().includes('security')
)const cls = ObjC.classes.FreeraspReactNative;
console.log("Methods:", cls.$ownMethods);const method = cls['- talsecStart:withResolver:withRejecter:'];
console.log("Method exists:", !!method);When analyzing IPA files, look for:
FreeraspReactNative.h- Main class header- Method signatures like
- (void)talsecStart:(id)start withResolver:(id)resolver withRejecter:(id)rejecter;
console.log("[+] freerasp-bypass-ios");
if (ObjC.available) {
const cls = ObjC.classes.FreeraspReactNative;
const method = cls['- talsecStart:withResolver:withRejecter:'];
if (method) {
method.implementation = new NativeCallback(() => {}, 'void', []);
}
}This tool is for educational and authorized penetration testing purposes only. Use responsibly and only on applications you own or have explicit permission to test.