Intercept Facebook network traffic on Android device
-
Updated
Feb 3, 2025 - Python
Intercept Facebook network traffic on Android device
Bypass SSL pinning in Facebook Android
Workplace-SSL-Pinning-Bypass demonstrates practical methods to bypass SSL/TLS pinning in the Workplace Android app, enabling HTTPS traffic interception for security research, reverse engineering, debugging, and penetration testing using common MITM tools.
Bypass SSL pinning in Messenger Android
Bypass SSL pinning in Threads Android
Setup Android Emulator (Android Studio/Genymotion) with Web Application Security Testing Tools (burp/owasp zap/Fiddler Classic)
Add a description, image, and links to the intercept-traffic topic page so that developers can more easily learn about it.
To associate your repository with the intercept-traffic topic, visit your repo's landing page and select "manage topics."