https://github.com/shahidcodes/android-nougat-ssl-intercept
It decompiles target apk and adds security exception to accept all certificates thus making able to work with Burp/Charles and Other Tools
https://github.com/shahidcodes/android-nougat-ssl-intercept
android apk burp certificates charles charles-proxy intercept interception-httphttps-request interceptor ssl ssl-certificates
Last synced: 29 days ago
JSON representation
It decompiles target apk and adds security exception to accept all certificates thus making able to work with Burp/Charles and Other Tools
- Host: GitHub
- URL: https://github.com/shahidcodes/android-nougat-ssl-intercept
- Owner: shahidcodes
- Created: 2017-10-07T10:56:36.000Z (almost 8 years ago)
- Default Branch: master
- Last Pushed: 2020-11-22T13:47:55.000Z (almost 5 years ago)
- Last Synced: 2025-04-05T21:42:26.222Z (6 months ago)
- Topics: android, apk, burp, certificates, charles, charles-proxy, intercept, interception-httphttps-request, interceptor, ssl, ssl-certificates
- Language: JavaScript
- Homepage:
- Size: 6.78 MB
- Stars: 17
- Watchers: 1
- Forks: 3
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Android Nougat SSL Intercept
In Android 7.0, Google introduced changes to the way user Certificate Authorities (CA) are trusted. These changes prevent third-parties from listening to network requests coming out of the application:
More info:
1) https://developer.android.com/training/articles/security-config.html
2) http://android-developers.blogspot.com/2016/07/changes-to-trusted-certificate.htmlThis script injects network security exceptions into the APK that allow third-party software like Charles Proxy/Fiddler to listen to the network requests and responses of some Android applications.
## Getting Started
1. Clone the repository.
2. In repo directory run `npm install`### Prerequisites
1. Node >= 6.9.*
2. JRE (to run apktool)## Usage
```
$ node addSecurityException.js /path/to/apk /path/to/keystore keystorePass
```
### Examples```
uses default keystore
$ node addSecurityException.js myApp.apkwith your keystore
$ node addSecurityException.js myApp.apk finalKey.jks android```
### Alternatives
- https://github.com/shroudedcode/apk-mitm
- https://bird.ac/injecting-mitm-proxy-on-compiled-android-apk/