This tool provides functionality to bypass SSL pinning on Android applications using Frida. It consists of two main components: a Frida server setup script and an injection script specifically designed to bypass SSL certificate verification.
- Facebook version: 498.0.0.54.74
- Python 3.x
- Android Debug Bridge (ADB)
- Frida (
pip install frida-tools
) - Rooted Android device
- Man-in-the-middle tool
-
Clone this repository
-
Install requirements:
pip install -r requirements.txt
-
Install mitmproxy:
- Linux:
apt install mitmproxy
- Windows: Download from official site
- Linux:
-
Start tool:
- Console:
mitmproxy
- Web UI:
mitmweb
- Console:
-
Android proxy setup:
- Wi-Fi settings
- Modify network
- Manual proxy
- Computer IP:8080
-
Certificate setup:
- Visit mitm.it
- Install certificate
- Enable in settings
Required Python packages:
frida-tools
requests
- Start your MITM tool (e.g., mitmproxy, Burp Suite)
- Configure Android proxy settings:
- Wi-Fi settings → Modify network
- Set Manual proxy
- Enter computer's IP and port (default: 8080)
- Install & enable MITM certificate on Android:
- Visit tool's cert page (e.g., mitm.it)
- Install & enable in Security settings
python start-frida-server.py
This will:
- Detect device architecture
- Download matching Frida server
- Install and run on device
python inject.py
This will:
- Hook into Facebook app
- Bypass SSL certificate verification
- Allow MITM inspection
- Watch intercepted traffic in MITM tool
- Analyze SSL/TLS communications
- Requires rooted Android device
- Facebook app specific
- Needs USB debugging enabled
- Custom SSL verification hook
-
Frida server issues:
- Check root access
- Verify ADB connection
- Match Frida versions
-
Injection problems:
- Confirm Frida is running
- Check Facebook app
- Verify device connection
- Test MITM configuration
This tool is for educational and research purposes only.