Skip to content

0xSHAK1B/Threads-SSL-Pinning-Bypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 

Repository files navigation

Threads SSL Pinning Bypass for Android (2026) – Intercept & Capture HTTPS Traffic

Telegram Android ARM64 x86_64

Bypass Threads SSL certificate pinning on Android to intercept, inspect, and analyze HTTPS network traffic — works on both rooted and non-rooted devices.


📖 Overview

This project provides a pre-patched Threads APK with SSL/TLS certificate pinning disabled, allowing security researchers and developers to capture and analyze Threads HTTPS traffic using standard MITM proxy tools.


🎥 Proof of Concept

Image

▶️ Watch the Full Video Demonstration


📋 Supported Threads Version

App Version Status
Threads 418.0.0.54.77 ✅ Bypassed

For the latest bypassed version, contact me on Telegram.


⚙️ Supported Architectures

Architecture Support
arm64-v8a
x86_64

📱 Requirements

Option A: Physical Android Device

  • Android phone or tablet (rooted or non-rooted)
  • A traffic interception proxy tool:

Option B: Android Emulator (PC)


🚀 Bypass Procedure

  1. Download the SSL pinning bypassed Threads APK from this repository.
  2. Install the patched APK on your Android device or emulator.
  3. Configure your proxy tool of choice (Proxypin, Reqable, Burp Suite, or Mitmproxy) to intercept traffic.
  4. Launch Threads and start capturing HTTPS requests and responses.

Tip: Make sure to install and trust the proxy's CA certificate on your device for full HTTPS decryption.


📬 Contact & Latest Builds

For the most up-to-date SSL pinning bypassed Threads APK, reach out directly:

Telegram


🏷️ Tags

threads ssl pinning bypass · threads certificate pinning · threads mitm · threads traffic interception · threads burp suite · threads proxy android · threads https decrypt · meta threads security · android ssl bypass no root · threads api reverse engineering

Releases

No releases published

Packages

 
 
 

Contributors