Open Source — Universal SSL Pinning Bypass with Frida ScriptsLearn more
An x-lock open source project

Intercept Android _

Real-time network analysis with SSL pinning bypass

  • Bypass SSL pinning on any Android app
  • Real-time traffic inspection and filtering
  • Frida-powered script injection engine
  • Export captures to HAR, JSON, or mitmproxy format
localhost:9090/capture
sniff!
Capturing
MethodURLStatusSize
GETapi.example.com/v2/user/profile2002.4K
POSTapi.example.com/v2/auth/token200892B
GETcdn.example.com/assets/config.json3040B
PUTapi.example.com/v2/user/settings2011.1K
GETapi.example.com/v2/feed/timeline20018K
POSTapi.example.com/v2/analytics/event2040B
GETapi.example.com/v2/notifications2004.7K
7 flows captured3 domainsSSL bypass active

All-in-one Android traffic analysis • Efficiency and control

Everything you need to intercept traffic

A complete toolkit for Android network analysis. From SSL pinning bypass to real-time traffic inspection, all in one terminal-based interface.

Traffic Capture

Intercept HTTP/HTTPS traffic from any Android application with transparent proxying and real-time flow display.

SSL Pinning Bypass

Universal SSL unpinning via Frida injection. Works on certificate pinning, public key pinning, and custom trust managers.

App Inspector

Browse installed apps, select targets, and inspect per-app network behavior with package-specific capture modes.

Frida Scripts

Manage and swap Frida scripts on the fly. Built-in universal bypass plus custom script support.

Device Manager

Monitor ADB connection, Frida server status, proxy configuration, and device info from a single dashboard.

Export Tools

Export captured flows to HAR, JSON, or mitmproxy-compatible formats for further analysis.