Inspecting a mobile app's HTTPS traffic using a proxy is probably the easiest way to figure out how it works. However, with the Network Security Configuration introduced in Android 7 and app developers trying to prevent MITM attacks using certificate pinning, getting an app to work with an HTTPS proxy has become quite tedious.
Features
- Decode the APK file using Apktool
- Replace the app's Network Security Configuration to allow user-added certificates
- Modify the source code to disable various certificate pinning implementations
- Encode the patched APK file using Apktool
- Sign the patched APK file using uber-apk-signer
- You can also use apk-mitm to patch apps using Android App Bundle and rooting your phone is not required
Categories
MiTM (Man-in-The-Middle) AttackLicense
MIT LicenseFollow apk-mitm
Other Useful Business Software
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of apk-mitm!