Toolset which makes possible hiddenly inject code in Android apps through system libraries
-
Updated
Aug 2, 2025 - Shell
Toolset which makes possible hiddenly inject code in Android apps through system libraries
A dynamic, Zygisk module for hot-swapping native libraries into Android applications without rebooting.
TikTok SSL Pinning Bypass for Android – intercept TikTok traffic.
APKs and libraries to analyze Facebook network traffic and bypass SSL pinning on Android devices for educational and security testing purposes.
Intercept Facebook network traffic on Android device
Bypass Instagram SSL pinning on Android devices.
Bypass Instagram SSL pinning on Android devices.
Bypass Instagram SSL pinning on iOS devices.
Meta Business Suite SSL Pinning Bypass for Android – intercept Meta Business Suite traffic.
Instagram SSL Pinning Bypass for Android – intercept Instagram traffic.
Workplace-SSL-Pinning-Bypass demonstrates practical methods to bypass SSL/TLS pinning in the Workplace Android app, enabling HTTPS traffic interception for security research, reverse engineering, debugging, and penetration testing using common MITM tools.
Intercept Facebook network traffic on Android device
Messenger SSL Pinning Bypass for Android – intercept Messenger traffic..
Bypass Messenger SSL pinning on Android devices.
Bypass Messenger SSL pinning on Android devices.
Intercept Messenger networks traffic on iOS device
Intercept Facebook networks traffic on iOS device
Bypass Meta Business Suite SSL pinning on Android devices.
Bypass Threads SSL Pinning on iOS devices.
Bypass Threads SSL pinning on Android devices
Add a description, image, and links to the ssl-unpinning topic page so that developers can more easily learn about it.
To associate your repository with the ssl-unpinning topic, visit your repo's landing page and select "manage topics."