This repository demonstrates how SSL/TLS certificate pinning works in the Messenger Android app, along with a practical example of bypass techniques and HTTPS traffic capture.
- arm64-v8a
- x86_64
- 537.0.0.52.109
- Android device (Rooted or Non-Rooted)
- One of the following traffic interception tools:
- Windows PC with:
- Reqable, Burp Suite, or Mitmproxy installed
- Nox or LDPlayer Android emulator
- Root access enabled in the emulator
- Replace patched
libcoldstart.so with /data/data/com.facebook.orca/lib-compressed/libcoldstart.so - Replace the patched library file:
adb push D:\patched\libcoldstart.so /data/data/com.facebook.orca/lib-compressed/libcoldstart.so
- Use Proxypin / Reqable / Burp Suite / Mitmproxy for capturing traffics.