Skip to content

Eltion/Tiktok-SSL-Pinning-Bypass

Repository files navigation

Tiktok SSL Pinning Bypass

Bypass TikTok SSL pinning on Android devices.
Supported ABIs: armeabi-v7a, arm64-v8a
The latest version: v37.0.4

If you like this project:

Bitcoin: bc1q6kvvun3cfm5kadesxflntszp8z9lqesra35law
Ethereum: 0x47633Ef59b0F765b7f8047b0A56230cfeBB34027
USDC: 0x47633Ef59b0F765b7f8047b0A56230cfeBB34027
USDT: 0x47633Ef59b0F765b7f8047b0A56230cfeBB34027

Patched APK (No Root)

Download the latest patched APK:

Run using Frida (Requires Root)

Requires frida-tools

frida -U -l .\tiktok-ssl-pinning-bypass.js -f com.zhiliaoapp.musically

Patch APK (with frida-gadget)

You can create your own patched APK.

Requirements Linux (Ubuntu):

  1. Install java JRE: sudo apt install default-jre
  2. Install apksigner: sudo apt install apksigner
  3. Install zipalign: sudo apt install zipalign

Note: apksigner and zipalign can also be found in android sdk build-tools

Requirements Windows:

  1. Install java JRE
  2. Download build-tools and unzip
  3. Add unzip folder to path variable

Instructions

  1. Download tiktok apk file.
  2. Install requirements > pip install -r requirements.txt
  3. Run script > python patch_apk.py -i <input apk> -o <output apk>

After that a patched apk file should be generated.

Intercept network traffic

You can use a tool like mitmproxy or Burp Suite to intercept the network.

  1. Install patched APK in the device
  2. Install mitmproxy or Burp Suite
  3. Set up proxy for wifi settings or run: adb shell settings put global http_proxy <proxy>

Now you should be able to see the network traffic.

View script logs

To view the logcat run:

adb logcat -s "TIKTOK_SSL_PINNING_BYPASS:V"

#leftenter