Skip to content

Workplace-SSL-Pinning-Bypass demonstrates practical methods to bypass SSL/TLS pinning in the Workplace Android app, enabling HTTPS traffic interception for security research, reverse engineering, debugging, and penetration testing using common MITM tools.

License

Notifications You must be signed in to change notification settings

MUH4MM4D-SH4KIB/Workplace-SSL-Pinning-Bypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” SSL Pinning Bypass β€” Workplace App

This repository demonstrates how SSL/TLS certificate pinning works in the Workplace Android app, along with a practical example of bypass techniques and HTTPS traffic capture.


πŸŽ₯ Demo Video

▢️ Watch the demonstration


βš™οΈ Supported Architectures

  • arm64-v8a
  • x86_64

Workplace App Version

  • 542.0.0.46.151

πŸ“± Mobile Device Requirements

  • Android device (Rooted or Non-Rooted)
  • One of the following traffic interception tools:

πŸ’» Emulator Setup

  • Windows PC with:
    • Reqable, Burp Suite, or Mitmproxy installed
    • Nox or LDPlayer Android emulator
    • Root access enabled in the emulator

πŸš€ Bypass Procedure

  1. Replace patched libcoldstart.so with /data/data/com.facebook.work/lib-compressed/libcoldstart.so
  2. Replace the patched library file:
    adb push D:\patched\libcoldstart.so /data/data/com.facebook.work/lib-compressed/libcoldstart.so
    
  3. Use Proxypin / Reqable / Burp Suite / Mitmproxy for capturing traffics.

For latest patched libcoldstart.so contract with me.

Telegram

About

Workplace-SSL-Pinning-Bypass demonstrates practical methods to bypass SSL/TLS pinning in the Workplace Android app, enabling HTTPS traffic interception for security research, reverse engineering, debugging, and penetration testing using common MITM tools.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published