Bypass Threads SSL certificate pinning on Android to intercept, inspect, and analyze HTTPS network traffic — works on both rooted and non-rooted devices.
This project provides a pre-patched Threads APK with SSL/TLS certificate pinning disabled, allowing security researchers and developers to capture and analyze Threads HTTPS traffic using standard MITM proxy tools.
| App | Version | Status |
|---|---|---|
| Threads | 418.0.0.54.77 | ✅ Bypassed |
For the latest bypassed version, contact me on Telegram.
| Architecture | Support |
|---|---|
arm64-v8a |
✅ |
x86_64 |
✅ |
- Android phone or tablet (rooted or non-rooted)
- A traffic interception proxy tool:
- Windows PC with one of the following emulators installed:
- A desktop MITM proxy tool:
- Burp Suite — industry standard
- Mitmproxy — open source
- Reqable
- Proxypin
- Download the SSL pinning bypassed Threads APK from this repository.
- Install the patched APK on your Android device or emulator.
- Configure your proxy tool of choice (Proxypin, Reqable, Burp Suite, or Mitmproxy) to intercept traffic.
- Launch Threads and start capturing HTTPS requests and responses.
Tip: Make sure to install and trust the proxy's CA certificate on your device for full HTTPS decryption.
For the most up-to-date SSL pinning bypassed Threads APK, reach out directly:
threads ssl pinning bypass · threads certificate pinning · threads mitm · threads traffic interception · threads burp suite · threads proxy android · threads https decrypt · meta threads security · android ssl bypass no root · threads api reverse engineering