One-click installer for Frida and Burp certs for SSL Pinning bypass
Alternatives To Frida_setup
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Trojan Go6,62053 months ago80September 14, 2021128gpl-3.0Go
Go实现的Trojan代理,支持多路复用/路由功能/CDN中转/Shadowsocks混淆插件,多平台,无依赖。A Trojan proxy written in Go. An unidentifiable mechanism that helps you bypass GFW.
Frida All In One1,160
4 years ago5HTML
《FRIDA操作手册》by @hluwa @r0ysue
4 years ago2Java
🔓 Disable SSL verification and pinning on Android, system-wide
Android Ssl Trustkiller537
5 years ago8otherJava
Bypass SSL certificate pinning for most applications
Abuse Ssl Bypass Waf213
2 years agoPython
Bypassing WAF by abusing SSL/TLS Ciphers
3 days ago5Rust
A simple proxy tunnel, minimalist tool for bypassing the GFW.
a month agoJavaScript
One-click installer for Frida and Burp certs for SSL Pinning bypass
Android Certkiller59
3 years ago3gpl-3.0Python
Script to Bypass SSL/Certificate Pinning in Android
Bypass Snapchat Ssl Certificate Pinning30
6 years ago4JavaScript
Bypass Snapchat certificate Pinning using Frida.
Gadget Injector24
4 years ago2otherPython
gadget-inejctor let's you bypass SSL Pinning using the frida-gadget.
Alternatives To Frida_setup
Select To Compare

Alternative Project Comparisons

Frida Setup

Installer script for Frida and Burp's certificate to help setup bypass SSL Pinning in Android applications. Works with Genymotion Emulator. Also works with Android studio if the emulator is started with the -writable-system flag. Eg:
./emulator -avd Pixel_3a_API_33_x86_64 -writable-system

Read the blog post for a detailed walkthrough -> One-click SSL-Pinning Bypass Setup

Installation steps

  • Make sure you have a device installed in Genymotion and it's up and running so the script can interact with ADB.
  • Start and keep Burp running so it can download the certificate.
  • Run the to start the installer.


  • Installs frida and frida-tools using pip. (Export the path to frida in your env if it's not already there)
  • Fetches the latest released version of Frida server from github.
  • Downloads certificate from Burp's proxy.
  • Pushes and installs the required files inside the ADB.
  • Cleans up the files and a reboot of the android system.


  • Run the frida server from /data/local/tmp inside adb shell.
  • Setup your proxies in Burp and Android's Wifi settings.
  • Start the ssl-pinning bypass using frida -U -f <package_name> -l frida3.js


  • Tested only on Arch Linux. Might have to change the sed command accordingly if you're on MacOS.
  • Adjust pip to pip3 if needed in the script.
  • Highly recommend using frida3.js rather than other scripts.
Popular Bypass Projects
Popular Ssl Projects
Popular Security Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Hacking Tool