You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm trying to bypass SSL pinning to intercept requests on the ClassDojo application with multiple apps inside it and I managed to patch it with your tool, but when I try to run it with the objection explore command and I open the application that has been installed on my cellphone, what happens is that it just stuck there and nothing another. By the way, I did this without a rooted device because I have economic limitations so I try to make the most of what I have. For the app you can download it here ClassDojo_6.27.1
My Device Samsung A05/SM A055F
This is the result of the command that I have run:
rizya@rizya17:~/patch-apk$ python3 patch-apk.py com.classdojo.android
Using apktool v2.9.3
[+] Retrieving APK path(s) for package: com.classdojo.android
[+] Pulling APK file(s) from device |################################| 5/5
[!] App bundle/split APK detected, rebuilding as a single APK.
[+] Disassembling split APKs |################################| 5/5W: Cant find 9patch chunk in file: "drawable-xhdpi-v4/vpi__tab_selected_holo.9.png". Renaming it to *.png.
W: Cant find 9patch chunk in file: "drawable-xhdpi-v4/vpi__tab_unselected_pressed_holo.9.png". Renaming it to *.png.
W: Cant find 9patch chunk in file: "drawable-xhdpi-v4/vpi__tab_unselected_holo.9.png". Renaming it to *.png.
W: Cant find 9patch chunk in file: "drawable-xhdpi-v4/vpi__tab_selected_focused_holo.9.png". Renaming it to *.png.
W: Cant find 9patch chunk in file: "drawable-xhdpi-v4/vpi__tab_selected_pressed_holo.9.png". Renaming it to *.png.
W: Cant find 9patch chunk in file: "drawable-xhdpi-v4/vpi__tab_unselected_focused_holo.9.png". Renaming it to *.png.
[+] Rebuilding as a single APK
[+] Patching com.classdojo.android-base.apk with objection.
[+] Patching APK to enable support for user-installed CA certificates.
[+] Uninstalling the original package from the device.
[+] Installing the patched APK to the device.
[+] Done
rizya@rizya17:~/patch-apk$ objection explore
Using USB device `SM A055F`
The text was updated successfully, but these errors were encountered:
I'm trying to bypass SSL pinning to intercept requests on the ClassDojo application with multiple apps inside it and I managed to patch it with your tool, but when I try to run it with the
objection explore
command and I open the application that has been installed on my cellphone, what happens is that it just stuck there and nothing another. By the way, I did this without a rooted device because I have economic limitations so I try to make the most of what I have. For the app you can download it here ClassDojo_6.27.1My Device
Samsung A05/SM A055F
This is the result of the command that I have run:
The text was updated successfully, but these errors were encountered: