Skip to content

Messenger SSL Pinning Bypass this repository demonstrates practical methods to bypass SSL/TLS pinning in the Messenger Android app, enabling HTTPS traffic interception for security research, reverse engineering, debugging, and penetration testing using common MITM tools.

License

Notifications You must be signed in to change notification settings

MUH4MM4D-SH4KIB/Messenger-SSL-Pinning-Bypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

10 Commits
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” SSL Pinning Bypass β€” Messenger App

This repository demonstrates how SSL/TLS certificate pinning works in the Messenger Android app, along with a practical example of bypass techniques and HTTPS traffic capture.


πŸŽ₯ Demo Video

▢️ Watch the demonstration


βš™οΈ Supported Architectures

  • arm64-v8a
  • x86_64

Messenger App Version

  • 537.0.0.52.109

πŸ“± Mobile Device Requirements

  • Android device (Rooted or Non-Rooted)
  • One of the following traffic interception tools:

πŸ’» Emulator Setup

  • Windows PC with:
    • Reqable, Burp Suite, or Mitmproxy installed
    • Nox or LDPlayer Android emulator
    • Root access enabled in the emulator

πŸš€ Bypass Procedure

  1. Replace patched libcoldstart.so with /data/data/com.facebook.orca/lib-compressed/libcoldstart.so
  2. Replace the patched library file:
    adb push D:\patched\libcoldstart.so /data/data/com.facebook.orca/lib-compressed/libcoldstart.so
    
  3. Use Proxypin / Reqable / Burp Suite / Mitmproxy for capturing traffics.

For latest patched libcoldstart.so contract with me.

Telegram

About

Messenger SSL Pinning Bypass this repository demonstrates practical methods to bypass SSL/TLS pinning in the Messenger Android app, enabling HTTPS traffic interception for security research, reverse engineering, debugging, and penetration testing using common MITM tools.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published