Bypass Instagram and Threads SSL pinning on Android devices.
Supported ABIs: x86
, x86_64
, armeabi-v7a
, arm64-v8a
Latest Instagram version: v275.0.0.27.98
Latest Threads version: v289.0.0.77.109
Download the latest Instagram patched APK:
- instagram-v275.0.0.27.98-x86.apk
- instagram-v275.0.0.27.98-x86_64.apk
- instagram-v275.0.0.27.98-armeabi-v7a.apk
- instagram-v275.0.0.27.98-arm64-v8a.apk
Download the latest Threads patched APK:
- threads-v289.0.0.77.109-x86.apk
- threads-v289.0.0.77.109-x86_64.apk
- threads-v289.0.0.77.109-armeabi-v7a.apk
- threads-v289.0.0.77.109-arm64-v8a.apk
This method requires frida-tools and also frida-server running in the device
frida -U -l .\instagram-ssl-pinning-bypass.js -f com.instagram.android
Threads
frida -U -l .\instagram-ssl-pinning-bypass.js -f com.instagram.barcelona
You can create your own patched APK.
- Install java JRE:
sudo apt install default-jre
- Install apksigner:
sudo apt install apksigner
- Install zipalign:
sudo apt install zipalign
Note: apksigner and zipalign can also be found in android sdk build-tools
- Install java JRE
- Download build-tools and unzip
- Add unzip folder to path variable
- Download instagram apk file.
- Install requirements >
pip install -r requirements.txt
- Run script >
python patch_apk.py -i <input apk> -o <output apk>
After that an patched apk file should be generated.
You can use a tool like mitmproxy or Burp Suite to intercept the network.
- Install patched APK in the device
- Install mitmproxy or Burp Suite
- Set up proxy for wifi settings or run:
adb shell settings put global http_proxy <proxy>
Now you should be able to see the network traffic.
Instagram-SSL-Pinning-Bypass.mp4
To view the logcat run:
adb logcat -s "INSTAGRAM_SSL_PINNING_BYPASS:V"