51j0 / Android-CertKiller

Script to Bypass SSL/Certificate Pinning in Android

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

alt text

Android-CertKiller

v0.5

An automation script to bypass SSL/Certificate pinning in Android

Requirements

  • Java 8 (JRE 1.8)
  • Basic knowledge of Android SDK, AAPT and smali

Currently Supporting

  • Bypassing default CA restrictions in Android Nougat & above Read more

Usage

git clone https://github.com/51j0/Android-CertKiller.git
cd Android-CertKiller/
python main.py

Options:
  -w  --wizard            #Extract APK from device
  -v  --verbose           #Verbose
  -p  --Path              #APK path
  -h  --help              #Help
  -d  --debugging-mode    #for setting android:debugging flag to true

Example:
root$ python main.py -w #(Wizard mode)
 #or
root$ python main.py -p 'root/Desktop/base.apk' #(Manual mode)

alt text

Icons made by Freepik from www.flaticon.com is licensed by CC 3.0 BY

About

Script to Bypass SSL/Certificate Pinning in Android

License:GNU General Public License v3.0


Languages

Language:Python 100.0%