Toolset which makes possible hiddenly inject code in Android apps through system libraries
-
Updated
Aug 2, 2025 - Shell
Toolset which makes possible hiddenly inject code in Android apps through system libraries
A dynamic, Zygisk module for hot-swapping native libraries into Android applications without rebooting.
TikTok SSL Pinning Bypass for Android – intercept TikTok traffic.
APKs and libraries to analyze Facebook network traffic and bypass SSL pinning on Android devices for educational and security testing purposes.
Bypass Instagram SSL pinning on Android devices.
Intercept Facebook network traffic on Android device
Bypass Instagram SSL pinning on Android devices.
Bypass Instagram SSL pinning on iOS devices.
Meta Business Suite SSL Pinning Bypass for Android – intercept Meta Business Suite traffic.
Instagram SSL Pinning Bypass for Android – intercept Instagram traffic.
Intercept Facebook network traffic on Android device
Workplace-SSL-Pinning-Bypass demonstrates practical methods to bypass SSL/TLS pinning in the Workplace Android app, enabling HTTPS traffic interception for security research, reverse engineering, debugging, and penetration testing using common MITM tools.
Messenger SSL Pinning Bypass for Android – intercept Messenger traffic..
Bypass Facebook SSL Pinning without root. Download pre-patched APKs for network traffic analysis on Android.
Bypass Messenger SSL pinning on Android devices.
Bypass Messenger SSL pinning on Android devices.
Intercept Messenger networks traffic on iOS device
Intercept Facebook networks traffic on iOS device
Bypass Meta Business Suite SSL pinning on Android devices.
Bypass Threads SSL Pinning on iOS devices.
Add a description, image, and links to the ssl-unpinning topic page so that developers can more easily learn about it.
To associate your repository with the ssl-unpinning topic, visit your repo's landing page and select "manage topics."