Android CertKiller Save

Script to Bypass SSL/Certificate Pinning in Android

Project README

alt text

Android-CertKiller

v0.5

An automation script to bypass SSL/Certificate pinning in Android

Requirements

  • Java 8 (JRE 1.8)
  • Basic knowledge of Android SDK, AAPT and smali

Currently Supporting

  • Bypassing default CA restrictions in Android Nougat & above Read more

Usage

git clone https://github.com/51j0/Android-CertKiller.git
cd Android-CertKiller/
python main.py

Options:
  -w  --wizard            #Extract APK from device
  -v  --verbose           #Verbose
  -p  --Path              #APK path
  -h  --help              #Help
  -d  --debugging-mode    #for setting android:debugging flag to true

Example:
root$ python main.py -w #(Wizard mode)
 #or
root$ python main.py -p 'root/Desktop/base.apk' #(Manual mode)

alt text

Icons made by Freepik from www.flaticon.com is licensed by CC 3.0 BY
Open Source Agenda is not affiliated with "Android CertKiller" Project. README Source: 51j0/Android-CertKiller
Stars
129
Open Issues
6
Last Commit
3 years ago
License

Open Source Agenda Badge

Open Source Agenda Rating