frida-okhttp3-tls

by
3 views 866bb6a9...

Description

Intercepts OkHttp3 requests redirects them to tls.peet.ws and prints the response.

How to Use

Run this script using Frida CLI:

frida --codeshare RadonCoding/frida-okhttp3-tls -f YOUR_BINARY

Source Code

JavaScript
// @RadonCoding
// 20/04/2025

Java.perform(function () {
  const OkHttpClient = Java.use("okhttp3.OkHttpClient");
  const originalNewCall = OkHttpClient.newCall.overload("okhttp3.Request");

  OkHttpClient.newCall.overload("okhttp3.Request").implementation = function (
    request
  ) {
    const url = request.url();

    console.log("[Intercepted] URL:", url.toString());

    const redirect = "https://tls.peet.ws/api/all";

    const builder = request.newBuilder();
    const redirected = builder.url(redirect).build();

    const call = originalNewCall.call(this, redirected);

    const response = call.execute();
    const body = response.body().string();

    console.log(`[Redirected] TLS Fingerprint for ${url.toString()}:`);
    console.log(body);

    return originalNewCall.call(this, request);
  };
});
Share this script:
Twitter LinkedIn

Comments

Login or Sign up to leave a comment.
Loading comments...