Analysis of Network Security Configuration bypasses with Frida | Adventures on Security