Skip to content

dodal-omkar/SSLSlayer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

SSLSlayer 🔐⚔️

A Frida-based script to bypass SSL pinning in Android applications during security assessments.
Built to handle real-world implementations across framework, library, and custom trust validation layers.


⚠️ Legal Disclaimer
This tool is intended for authorized security testing only.
Do not use against applications without explicit written permission.
The author is not responsible for misuse.


The Problem

Modern Android apps enforce SSL pinning to prevent:

  • MITM interception
  • Proxy-based traffic inspection
  • Runtime analysis of HTTPS communication

Typical behavior: SSL validation → Pin mismatch → Connection blocked

This blocks visibility into API traffic, even in controlled testing environments.


The Approach

Instead of modifying the APK or patching certificates, SSLSlayer hooks SSL validation logic at runtime using Frida.


Coverage

Framework-Level Hooks

  • SSLContext.init (TrustManager injection)
  • HostnameVerifier
  • HttpsURLConnection
  • NetworkSecurityPolicy
  • WebViewClient.onReceivedSslError

Library Support

  • OkHttpCertificatePinner, OkHostnameVerifier, Builder overrides
  • ConscryptTrustManagerImpl.checkServerTrusted, verifyChain
  • TrustKitOkHostnameVerifier, PinningTrustManager

Advanced Coverage

  • Direct SSLSocket usage
  • Custom X509TrustManager auto-detection
  • Dynamic class loading handling
  • Native SSL library detection (warning mode)

Features

  • Dynamic class wait (no fixed delays)
  • Safe hook installation (no crash on missing classes)
  • Automatic detection of custom trust managers
  • Broad compatibility across Android versions
  • Runtime logging for analysis

Usage

Spawn and hook (recommended)

frida -U -f com.target.app -l SSLSlayer_v3.js

Remote Frida server

frida -H 127.0.0.1:PORT -f com.target.app -l SSLSlayer_v3.js

In action

image

Limitations

  • Advanced native pinning (BoringSSL/OpenSSL) may require additional native hooks
  • Anti-Frida protections can interfere with execution
  • Some heavily obfuscated apps may need manual class name adjustments

About

A Frida-based script for bypassing SSL pinning during authorized Android application security assessments.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors