Comment on Could someone explain the networking behind transparent proxies and MiTM snooping using certificates to me?

<- View Parent
stifle867@programming.dev ⁨11⁩ ⁨months⁩ ago

Specifically for attempting to bypass certificate pinning you’re solidly in the realm of reverse engineering. I haven’t attempting it myself but I have read the efforts of others over the years and the process was quite evolved and ever changing. If you are interested in going down this rabbit hole you may use these links as starting points but be prepared to adapt them.

…medium.com/uncertify-a-tool-for-recompiling-andr…

frida.re

codeshare.frida.re/browse

Best of luck.

source
Sort:hotnewtop