frida-okhttp3-tls
3 views
866bb6a9...
Description
Intercepts OkHttp3 requests redirects them to tls.peet.ws and prints the response.
How to Use
Run this script using Frida CLI:
frida --codeshare RadonCoding/frida-okhttp3-tls -f YOUR_BINARY
Source Code
JavaScript
// @RadonCoding
// 20/04/2025
Java.perform(function () {
const OkHttpClient = Java.use("okhttp3.OkHttpClient");
const originalNewCall = OkHttpClient.newCall.overload("okhttp3.Request");
OkHttpClient.newCall.overload("okhttp3.Request").implementation = function (
request
) {
const url = request.url();
console.log("[Intercepted] URL:", url.toString());
const redirect = "https://tls.peet.ws/api/all";
const builder = request.newBuilder();
const redirected = builder.url(redirect).build();
const call = originalNewCall.call(this, redirected);
const response = call.execute();
const body = response.body().string();
console.log(`[Redirected] TLS Fingerprint for ${url.toString()}:`);
console.log(body);
return originalNewCall.call(this, request);
};
});
Comments