https-stalker
4 views
0e0c990d...
Description
trace https payloads
How to Use
Download the script and run it with Frida CLI:
Download ScriptThen run with Frida:
frida -U -f YOUR_PACKAGE_NAME -l https-stalker.js
Replace YOUR_PACKAGE_NAME with the target app's package name.
Source Code
JavaScript
Java.perform(() => {
const Log = Java.use('android.util.Log')
const Exception = Java.use('java.lang.Exception')
const String = Java.use('java.lang.String')
function trace(...args) {
console.log(...args)
}
const SSLOutputStream = Java.use(
'com.android.org.conscrypt.ConscryptEngineSocket$SSLOutputStream'
)
SSLOutputStream.write.overload('[B', 'int', 'int').implementation = function(
...args
) {
const [bytes, offset, len] = args
const plain = String.$new(bytes, offset, len)
Log.e('trace<---', plain, Exception.$new())
trace('trace<---', plain)
return this.write(...args)
}
const SSLInputStream = Java.use(
'com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream'
)
SSLInputStream.read.overload('[B', 'int', 'int').implementation = function(
...args
) {
const [bytes, offset, len] = args
const plain = String.$new(bytes, offset, len)
Log.e('trace--->', plain, Exception.$new())
trace('trace--->', plain)
return this.read(...args)
}
})
Comments