Skip to content

This script can be used by Frida to hijack SSL context and okhttp CertificateBuilder

Notifications You must be signed in to change notification settings

Zero3141/Frida-OkHttp-Bypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

Frida OkHttp 4.9.0 SSL pinning bypass

This script can be used by frida to hijack ssl pinning functions SSLContext.init() and CertificatePinner$Builder.build()

Requirements

  • Rooted android device/emulator (I use Genymotion)
  • Running frida-server on android device
  • Proxy set to network listener application (Fiddler, BurpSuit, ...)

Usage

Push your certificate to device

adb push [PATH_TO_CERT] /data/local/tmp/root.cer

Run script

frida -U -f [TARGET_APP] -l [PATH_TO_THIS_SCRIPT] --no-paus

Profit

About

This script can be used by Frida to hijack SSL context and okhttp CertificateBuilder

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published