Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

ssl-pinning-remover

Package Overview
Dependencies
Maintainers
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

ssl-pinning-remover

An SSL Pinning Remover for Android Apps

  • 1.0.0
  • PyPI
  • Socket score

Maintainers
1

PyPI version shields.io made-with-python

Brief history

All it started with two simple questions:

How we can sniff ssl traffic in order to understand which services are invoked?

and

Is there a method to automate all the process from decompile a .apk to upload on your device?

For the first questions i found a lot of guides that explain the procedure of modify the AndroidManifest.xml and the network_security_config.xml but there is not a single formula, there are different factors to understand in order to do it correctly.

For the second question is: Yes... but.

i found different types of project the on Github but they aren't completely automated in all those phases so here we are.

I read a lot of guides most of those requires to have a rooted device so i tried to create something to sniff the encrypted traffic unrooted devices in order to help all security researchers, this software is UNSTABLE for now a lot of "unlocked" apps will not work with this mod.

How it work?

ssl_pinning_remover has all the following phases:

  1. Unpack the .apk app with apktool
  2. Check if the AndroidManifest.xml has the correct attributes and if network_security_config.xml exists with the correct tags
  3. Repack the modified files in a new apk packet
  4. Sign the new apk with a self signed certificate
  5. Align the certified apk
  6. it upload the new jar in the connected android device (Optional)

Prerequisites

To use this script you need to install all those softwares in your environment:

On your device:

How to install

$ pip install -r requirements.txt
$ pip install ssl-pinning-remover

How to use

ParameterDescriptionMandatory
-i --inputUsed to specify the input .apk pathYes
-v --verboseUsed to increase the stdout verbosityNo
-u --uploadUsed to specify if you want upload the "unlocked" apk in the connected device or notNo

Example

Elaborate without uploading .apk:

ssl_pinning_remover -i test.apk -v

Elaborate and upload .apk:

ssl_pinning_remover -i test.apk -v -u

ToDo List

  • Continue implementing studying difference configuration cases

  • Make the software working for most of the applications in the play store

  • Add more options

  • Code review

Disclaimer

This project is for educational and research purposes only. Any actions and/or activities related to the material contained on this GitHub Repository is solely your responsibility. The misuse of the information in this GitHub Repository can result in criminal charges brought against the persons in question. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this GitHub Repository to break the law.

Keywords

FAQs


Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc