-
Notifications
You must be signed in to change notification settings - Fork 630
Android without ROOT uses Xposed module to capture packets
Non root users can use the Xposed JustTrustMe module to capture packets, supporting Android 14. I have tested that most of them can be captured.
Step 1: Download Fuxi, which allows the application to load the Xposed module already installed on the local machine
URL:https://www.die.lu/
download svxp64_xx.apk
Github Download: https://github.com/Katana-Official/SPatch-Update/releases
Netdisk download(Code 2035): https://url38.ctfile.com/d/15037138-28988502-8fce96
After installing the application, it is Fuxi x64
JustTrustMe is an Xposed module that disables SSL certificate checking
Giuhub: https://github.com/Fuzion24/JustTrustMe/releases
Netdisk download(Code 8902): https://url37.ctfile.com/f/50805637-984778183-a2b7a3?p=8902
Open the Fuxi app, click on the menu bar in the lower right corner, select Install from File Manager, and select the downloaded JustTrustMe.apk from the folder.
After successful installation, you can see it from the module role manager
From the Fuxi application, click the menu bar in the lower right corner and select Add (Install) Cloning Software Select the software to capture packets, click 1 in the lower right corner, and select the number of clones to complete.
Open the packet capture software ProxyPin, and then open the cloned application from Fuxi to start capturing packets. I tested that most of them can be captured. If some domain names all fail the SSL handshake, in order not to affect the use of the application, you can capture the packets in ProxyPin Add domain name to domain name blacklist