Bypass Messenger SSL pinning on Android devices.
Supported ABIs: arm64-v8a
, x86
Latest version: v391.2.0.20.404
Bitcoin: bc1q6kvvun3cfm5kadesxflntszp8z9lqesra35law
Ethereum: 0x47633Ef59b0F765b7f8047b0A56230cfeBB34027
Download the latest patched APK:
- messenger-v391.2.0.20.404-arm64-v8a.apk
- messenger-v391.2.0.20.404-armeabi-v7a.apk
- messenger-v391.2.0.20.404-x86.apk
This method requires frida-tools and also frida-server running in the device
frida -U -l .\messenger-ssl-pinning-bypass.js -f com.facebook.orca
You can create your own patched APK.
- Install java JRE:
sudo apt install default-jre
- Install apksigner:
sudo apt install apksigner
- Install zipalign:
sudo apt install zipalign
Note: apksigner and zipalign can also be found in android sdk build-tools
- Install java JRE
- Download build-tools and unzip
- Add unzip folder to path variable
- Download Messenger apk file.
- Install requirements >
pip install -r requirements.txt
- Run script >
python patch_apk.py -i <input apk> -o <output apk>
After that an patched apk file should be generated.
You can use a tool like mitmproxy or Burp Suite to intercept the network.
- Install patched APK in the device
- Install mitmproxy or Burp Suite
- Set up proxy for wifi settings or run:
adb shell settings put global http_proxy <proxy>
Now you should be able to see the network traffic.
To view the logcat run:
adb logcat -s "MESSENGER_SSL_PINNING_BYPASS:V"