android-ssl-pinning-bypass-2

by
4 views 33c0812b...

Description

Rebase of an existing script. Created for personal use.

How to Use

Download the script and run it with Frida CLI:

Download Script

Then run with Frida:

frida -U -f YOUR_PACKAGE_NAME -l android-ssl-pinning-bypass-2.js

Replace YOUR_PACKAGE_NAME with the target app's package name.

Source Code

JavaScript
/************************************************************************
* Name: Android SSL Pinning Bypass 2
* OS: Android
* Author: sowdust (Credits to the author!)
* Source: https://codeshare.frida.re/@sowdust/universal-android-ssl-pinning-bypass-2
* Edited: https://github.com/ivan-sincek/android-penetration-testing-cheat-sheet/blob/main/scripts/android-ssl-pinning-bypass-2.js
************************************************************************/
setTimeout(function() {
	Java.perform(function() {
		var ArrayList = Java.use("java.util.ArrayList");
		var TrustManagerImpl = Java.use("com.android.org.conscrypt.TrustManagerImpl");
		console.log("Running Android SSL Pinning Bypass...");
		TrustManagerImpl.checkTrustedRecursive.implementation = function(a, b, c, d, e, f) {
			return ArrayList.$new();
		};
	});
}, 0);
Share this script:
Twitter LinkedIn

Comments

Login or Sign up to leave a comment.
Loading comments...