https://github.com/viralvaghela/android-pt-notes
Notes for reversing android apps, PT and resources
https://github.com/viralvaghela/android-pt-notes
Last synced: 4 months ago
JSON representation
Notes for reversing android apps, PT and resources
- Host: GitHub
- URL: https://github.com/viralvaghela/android-pt-notes
- Owner: viralvaghela
- License: mit
- Created: 2025-01-17T05:49:20.000Z (9 months ago)
- Default Branch: main
- Last Pushed: 2025-01-20T15:08:55.000Z (9 months ago)
- Last Synced: 2025-04-05T14:28:51.837Z (6 months ago)
- Language: Python
- Size: 47.6 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# All-in-One Setup
**Blog:** [Hail Frida: The Universal SSL Pinning Bypass for Android](https://infosecwriteups.com/hail-frida-the-universal-ssl-pinning-bypass-for-android-e9e1d733d29)
## Steps:
1. Install Frida on PC and download the Android server.
2. Push the server to `/data/local/tmp`:
```bash
adb push /data/local/tmp
adb shell chmod 777 /data/local/tmp/frida-server
3. Push the proxy’s CA Certificate:
```bash
adb push /data/local/tmp/cert-der.crt
```
4. Push fridascript.js into the device:
```bash
adb push fridascript.js /data/local/tmp
```
5. Run the Frida server in another command prompt:
```bash
adb shell /data/local/tmp/frida-server &
```
6. Open another terminal and check all running processes:
```bash
frida-ps -U
frida-ps -Uai
```
7. Hook the app:
```bash
frida -U -f com.app.test -l D:\Open_tools\platform-tools\fridascript.js --pause
```## Other links
[SSL By Pass Patching](https://github.com/ilya-kozyr/android-ssl-pinning-bypass)
[Resources by Mobexler](https://www.mobexler.com/resource)