This script can be used by frida to hijack ssl pinning functions SSLContext.init()
and CertificatePinner$Builder.build()
- Rooted android device/emulator (I use Genymotion)
- Running frida-server on android device
- Proxy set to network listener application (Fiddler, BurpSuit, ...)
Push your certificate to device
adb push [PATH_TO_CERT] /data/local/tmp/root.cer
Run script
frida -U -f [TARGET_APP] -l [PATH_TO_THIS_SCRIPT] --no-paus
Profit