This repository demonstrates how SSL/TLS certificate pinning works in the Workplace Android app, along with a practical example of bypass techniques and HTTPS traffic capture.
- arm64-v8a
- x86_64
- 542.0.0.46.151
- Android device (Rooted or Non-Rooted)
- One of the following traffic interception tools:
- Windows PC with:
- Reqable, Burp Suite, or Mitmproxy installed
- Nox or LDPlayer Android emulator
- Root access enabled in the emulator
- Replace patched
libcoldstart.so with /data/data/com.facebook.work/lib-compressed/libcoldstart.so - Replace the patched library file:
adb push D:\patched\libcoldstart.so /data/data/com.facebook.work/lib-compressed/libcoldstart.so
- Use Proxypin / Reqable / Burp Suite / Mitmproxy for capturing traffics.